Risk | Low |
Patch available | YES |
Number of vulnerabilities | 42 |
CVE-ID | CVE-2022-49862 CVE-2022-49871 CVE-2022-49881 CVE-2022-49907 CVE-2022-49918 CVE-2022-49921 CVE-2022-49934 CVE-2022-49938 CVE-2022-49942 CVE-2022-49948 CVE-2022-49964 CVE-2022-49969 CVE-2022-49986 CVE-2022-49987 CVE-2022-49989 CVE-2022-50022 CVE-2022-50033 CVE-2022-50053 CVE-2022-50066 CVE-2022-50084 CVE-2022-50085 CVE-2022-50087 CVE-2022-50098 CVE-2022-50103 CVE-2022-50127 CVE-2022-50134 CVE-2022-50160 CVE-2022-50185 CVE-2022-50191 CVE-2022-50202 CVE-2022-50211 CVE-2022-50220 CVE-2022-50228 CVE-2022-50229 CVE-2023-3090 CVE-2023-53109 CVE-2025-37911 CVE-2025-37932 CVE-2025-38023 CVE-2025-38024 CVE-2025-38063 CVE-2025-38079 |
CWE-ID | CWE-908 CWE-401 CWE-125 CWE-667 CWE-416 CWE-388 CWE-399 CWE-191 CWE-20 CWE-476 CWE-835 CWE-119 CWE-787 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component python2-perf-debuginfo Operating systems & Components / Operating system package or component python2-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 42 vulnerabilities.
EUVDB-ID: #VU108337
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49862
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the iforce_init_device() function in drivers/input/joystick/iforce/iforce-main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108143
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49871
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the local_bh_disable() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108138
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49881
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the regdb_fw_cb() and query_regdb_file() functions in net/wireless/reg.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108252
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49907
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __mdiobus_register() function in drivers/net/phy/mdio_bus.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108309
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49918
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ip_vs_conn_net_init() function in net/netfilter/ipvs/ip_vs_conn.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108219
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49921
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the red_enqueue() function in net/sched/sch_red.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111444
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49934
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __ieee80211_scan_completed() function in net/mac80211/scan.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111400
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49938
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the SMB2_negotiate() function in fs/cifs/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111611
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49942
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ieee80211_ibss_finish_csa() function in net/mac80211/ibss.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111486
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49948
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the con_font_set() and con_font_default() functions in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111665
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49964
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ci_leaf_init() and init_cache_level() functions in arch/arm64/kernel/cacheinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111624
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49969
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the optc1_enable_optc_clock() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_optc.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111447
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49986
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the storvsc_probe() function in drivers/scsi/storvsc_drv.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111697
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49987
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the md_stop() function in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111539
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49989
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lock_pages() and privcmd_ioctl_dm_op() functions in drivers/xen/privcmd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111457
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50022
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the raid5_end_write_request() function in drivers/md/raid5.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111376
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50033
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ohci_hcd_ppc_of_probe() function in drivers/usb/host/ohci-ppc-of.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111593
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50053
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111481
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50066
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the aq_nic_service_timer_cb(), aq_nic_get_regs_count(), aq_nic_get_stats(), aq_nic_set_loopback() and aq_nic_stop() functions in drivers/net/ethernet/aquantia/atlantic/aq_nic.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111479
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50084
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the raid_status() function in drivers/md/dm-raid.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111641
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50085
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the attempt_restore_of_faulty_devices() function in drivers/md/dm-raid.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111421
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50087
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the scpi_init_versions() and scpi_probe() functions in drivers/firmware/arm_scpi.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111579
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50098
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the qla2xxx_eh_abort(), qla2x00_eh_wait_for_pending_commands(), qla2xxx_eh_device_reset() and qla2xxx_eh_target_reset() functions in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111477
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50103
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cpuset_cpumask_can_shrink() and task_can_attach() functions in kernel/sched/core.c, within the cpuset_can_attach() function in kernel/cgroup/cpuset.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111575
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50127
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rxe_qp_init_misc(), rxe_qp_init_req() and rxe_qp_init_resp() functions in drivers/infiniband/sw/rxe/rxe_qp.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111294
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50134
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the setup_base_ctxt() function in drivers/infiniband/hw/hfi1/file_ops.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50160
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ap_flash_init() function in drivers/mtd/maps/physmap-versatile.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111635
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50185
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ni_set_mc_special_registers() function in drivers/gpu/drm/radeon/ni_dpm.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111363
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50191
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the of_get_regulation_constraints() function in drivers/regulator/of_regulator.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111567
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50202
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snapshot_open(), snapshot_write() and snapshot_ioctl() functions in kernel/power/user.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111433
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50211
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the raid10_remove_disk() function in drivers/md/raid10.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111440
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50220
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drivers/net/usb/usbnet.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111619
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50228
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the svm_set_irq() function in arch/x86/kvm/svm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111441
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50229
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bcd2000_init_midi() function in sound/usb/bcd2000/bcd2000.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78010
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-3090
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the ipvlan network driver in Linux kernel. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108480
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53109
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the LL_RESERVED_SPACE() function in net/ipv6/ip6_tunnel.c, within the ip_md_tunnel_xmit() and ip_tunnel_xmit() functions in net/ipv4/ip_tunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109514
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37911
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bnxt_hwrm_dbg_dma_data() function in drivers/net/ethernet/broadcom/bnxt/bnxt_coredump.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109572
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37932
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the htb_qlen_notify() function in net/sched/sch_htb.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111469
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38023
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nfs4_alloc_unlockdata() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111468
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38024
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rxe_cq_from_init() function in drivers/infiniband/sw/rxe/rxe_cq.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111600
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38063
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __send_empty_flush() function in drivers/md/dm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111459
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38079
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hash_accept() function in crypto/algif_hash.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2507.2.0.0335
python3-perf: before 4.19.90-2507.2.0.0335
python2-perf-debuginfo: before 4.19.90-2507.2.0.0335
python2-perf: before 4.19.90-2507.2.0.0335
perf-debuginfo: before 4.19.90-2507.2.0.0335
perf: before 4.19.90-2507.2.0.0335
kernel-tools-devel: before 4.19.90-2507.2.0.0335
kernel-tools-debuginfo: before 4.19.90-2507.2.0.0335
kernel-tools: before 4.19.90-2507.2.0.0335
kernel-source: before 4.19.90-2507.2.0.0335
kernel-devel: before 4.19.90-2507.2.0.0335
kernel-debugsource: before 4.19.90-2507.2.0.0335
kernel-debuginfo: before 4.19.90-2507.2.0.0335
bpftool-debuginfo: before 4.19.90-2507.2.0.0335
bpftool: before 4.19.90-2507.2.0.0335
kernel: before 4.19.90-2507.2.0.0335
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1820
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.