Risk | Low |
Patch available | YES |
Number of vulnerabilities | 19 |
CVE-ID | CVE-2021-47659 CVE-2022-49053 CVE-2022-49243 CVE-2022-49292 CVE-2022-49335 CVE-2022-49350 CVE-2022-49381 CVE-2022-49388 CVE-2022-49490 CVE-2022-49508 CVE-2022-49535 CVE-2022-49603 CVE-2022-49625 CVE-2022-49678 CVE-2022-49713 CVE-2022-49720 CVE-2022-49727 CVE-2025-21687 CVE-2025-21806 |
CWE-ID | CWE-401 CWE-416 CWE-119 CWE-476 CWE-415 CWE-366 CWE-125 CWE-190 CWE-682 CWE-388 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system python3-perf-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component python2-perf-debuginfo Operating systems & Components / Operating system package or component python2-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 19 vulnerabilities.
EUVDB-ID: #VU104411
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47659
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the drm_universal_plane_init() function in drivers/gpu/drm/drm_plane.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104481
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49053
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tcmu_try_get_data_page() and tcmu_vma_fault() functions in drivers/target/target_core_user.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104230
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49243
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the at91sam9g20ek_audio_probe() function in sound/soc/atmel/sam9g20_wm8731.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104798
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49292
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the snd_pcm_plugin_alloc() function in sound/core/oss/pcm_plugin.c, within the snd_pcm_oss_period_size() and snd_pcm_oss_change_params_locked() functions in sound/core/oss/pcm_oss.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104562
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49335
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_cs_parser_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104732
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49350
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the mdio_bus_init() function in drivers/net/phy/mdio_bus.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104263
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49381
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the jffs2_free_raw_node_refs() function in fs/jffs2/fs.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104430
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49388
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the spin_unlock() function in drivers/mtd/ubi/vmt.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104587
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49490
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mdp5_plane_atomic_check_with_state() function in drivers/gpu/drm/msm/disp/mdp5/mdp5_plane.c, within the mdp5_pipe_assign() and mdp5_pipe_release() functions in drivers/gpu/drm/msm/disp/mdp5/mdp5_pipe.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104737
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49508
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the elan_input_configured() function in drivers/hid/hid-elan.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104456
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49535
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lpfc_initial_flogi(), lpfc_initial_fdisc(), lpfc_cmpl_els_plogi(), lpfc_cmpl_els_prli() and lpfc_cmpl_els_adisc() functions in drivers/scsi/lpfc/lpfc_els.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104825
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49603
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to corrupt data.
The vulnerability exists due to a data race within the ip_forward() function in net/ipv4/ip_forward.c, within the mlxsw_sp_dscp_init() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c. A local user can corrupt data.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104452
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49625
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the efx_ef10_try_update_nic_stats_vf() function in drivers/net/ethernet/sfc/ef10.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104335
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49678
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the brcmstb_pm_probe() function in drivers/soc/bcm/brcmstb/pm/pm-arm.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104347
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49713
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dwc2_hcd_init() function in drivers/usb/dwc2/hcd.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104523
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49720
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the blk_mq_alloc_request_hctx() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104784
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49727
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the l2tp_ip6_sendmsg() function in net/l2tp/l2tp_ip6.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103753
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21687
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the vfio_platform_read_mmio() and vfio_platform_write_mmio() functions in drivers/vfio/platform/vfio_platform_common.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105153
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21806
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the proc_do_dev_weight() and sizeof() functions in net/core/sysctl_net_core.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
python3-perf-debuginfo: before 4.19.90-2503.5.0.0321
python3-perf: before 4.19.90-2503.5.0.0321
python2-perf-debuginfo: before 4.19.90-2503.5.0.0321
python2-perf: before 4.19.90-2503.5.0.0321
perf-debuginfo: before 4.19.90-2503.5.0.0321
perf: before 4.19.90-2503.5.0.0321
kernel-tools-devel: before 4.19.90-2503.5.0.0321
kernel-tools-debuginfo: before 4.19.90-2503.5.0.0321
kernel-tools: before 4.19.90-2503.5.0.0321
kernel-source: before 4.19.90-2503.5.0.0321
kernel-devel: before 4.19.90-2503.5.0.0321
kernel-debugsource: before 4.19.90-2503.5.0.0321
kernel-debuginfo: before 4.19.90-2503.5.0.0321
bpftool-debuginfo: before 4.19.90-2503.5.0.0321
bpftool: before 4.19.90-2503.5.0.0321
kernel: before 4.19.90-2503.5.0.0321
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1336
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.