openEuler 20.03 LTS SP3 update for kernel



Published: 2023-04-14
Risk Medium
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2023-1582
CVE-2023-1611
CVE-2021-3923
CVE-2023-1637
CVE-2023-1670
CVE-2023-1838
CVE-2023-1855
CVE-2023-1859
CWE-ID CWE-362
CWE-416
CWE-401
CWE-1342
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
openEuler
Operating systems & Components / Operating system

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Race condition

EUVDB-ID: #VU74629

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1582

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within fs/proc/task_mmu.c. A local user can exploit the race and crash the kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP3

python3-perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools: before 4.19.90-2304.3.0.0197

python2-perf: before 4.19.90-2304.3.0.0197

bpftool-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-devel: before 4.19.90-2304.3.0.0197

kernel-devel: before 4.19.90-2304.3.0.0197

bpftool: before 4.19.90-2304.3.0.0197

perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-debuginfo: before 4.19.90-2304.3.0.0197

kernel-source: before 4.19.90-2304.3.0.0197

kernel-debugsource: before 4.19.90-2304.3.0.0197

python2-perf-debuginfo: before 4.19.90-2304.3.0.0197

perf: before 4.19.90-2304.3.0.0197

python3-perf: before 4.19.90-2304.3.0.0197

kernel: before 4.19.90-2304.3.0.0197

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1229


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU75204

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1611

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the btrfs_search_slot() function in fs/btrfs/ctree.c. A local user can trigger a use-after-free error and crash the kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP3

python3-perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools: before 4.19.90-2304.3.0.0197

python2-perf: before 4.19.90-2304.3.0.0197

bpftool-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-devel: before 4.19.90-2304.3.0.0197

kernel-devel: before 4.19.90-2304.3.0.0197

bpftool: before 4.19.90-2304.3.0.0197

perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-debuginfo: before 4.19.90-2304.3.0.0197

kernel-source: before 4.19.90-2304.3.0.0197

kernel-debugsource: before 4.19.90-2304.3.0.0197

python2-perf-debuginfo: before 4.19.90-2304.3.0.0197

perf: before 4.19.90-2304.3.0.0197

python3-perf: before 4.19.90-2304.3.0.0197

kernel: before 4.19.90-2304.3.0.0197

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1229


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Memory leak

EUVDB-ID: #VU74626

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3923

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due memory leak within RDMA over infiniband implementation in Linux kernel. A local user can force the application to leak memory by sensing commands to the /dev/infiniband/rdma_cm device node and gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP3

python3-perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools: before 4.19.90-2304.3.0.0197

python2-perf: before 4.19.90-2304.3.0.0197

bpftool-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-devel: before 4.19.90-2304.3.0.0197

kernel-devel: before 4.19.90-2304.3.0.0197

bpftool: before 4.19.90-2304.3.0.0197

perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-debuginfo: before 4.19.90-2304.3.0.0197

kernel-source: before 4.19.90-2304.3.0.0197

kernel-debugsource: before 4.19.90-2304.3.0.0197

python2-perf-debuginfo: before 4.19.90-2304.3.0.0197

perf: before 4.19.90-2304.3.0.0197

python3-perf: before 4.19.90-2304.3.0.0197

kernel: before 4.19.90-2304.3.0.0197

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1229


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Information exposure through microarchitectural state after transient execution

EUVDB-ID: #VU74771

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1637

CWE-ID: CWE-1342 - Information Exposure through Microarchitectural State after Transient Execution

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due speculative execution behavior in the Linux kernel X86 CPU Power management options functionality. A local user can gain access to sensitive information.


Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP3

python3-perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools: before 4.19.90-2304.3.0.0197

python2-perf: before 4.19.90-2304.3.0.0197

bpftool-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-devel: before 4.19.90-2304.3.0.0197

kernel-devel: before 4.19.90-2304.3.0.0197

bpftool: before 4.19.90-2304.3.0.0197

perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-debuginfo: before 4.19.90-2304.3.0.0197

kernel-source: before 4.19.90-2304.3.0.0197

kernel-debugsource: before 4.19.90-2304.3.0.0197

python2-perf-debuginfo: before 4.19.90-2304.3.0.0197

perf: before 4.19.90-2304.3.0.0197

python3-perf: before 4.19.90-2304.3.0.0197

kernel: before 4.19.90-2304.3.0.0197

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1229


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU75450

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1670

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Xircom 16-bit PCMCIA (PC-card) Ethernet driver. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP3

python3-perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools: before 4.19.90-2304.3.0.0197

python2-perf: before 4.19.90-2304.3.0.0197

bpftool-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-devel: before 4.19.90-2304.3.0.0197

kernel-devel: before 4.19.90-2304.3.0.0197

bpftool: before 4.19.90-2304.3.0.0197

perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-debuginfo: before 4.19.90-2304.3.0.0197

kernel-source: before 4.19.90-2304.3.0.0197

kernel-debugsource: before 4.19.90-2304.3.0.0197

python2-perf-debuginfo: before 4.19.90-2304.3.0.0197

perf: before 4.19.90-2304.3.0.0197

python3-perf: before 4.19.90-2304.3.0.0197

kernel: before 4.19.90-2304.3.0.0197

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1229


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU75205

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1838

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the vhost_net_set_backend() function in drivers/vhost/net.c. A local user can trigger a use-after-free error and crash the kernel.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP3

python3-perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools: before 4.19.90-2304.3.0.0197

python2-perf: before 4.19.90-2304.3.0.0197

bpftool-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-devel: before 4.19.90-2304.3.0.0197

kernel-devel: before 4.19.90-2304.3.0.0197

bpftool: before 4.19.90-2304.3.0.0197

perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-debuginfo: before 4.19.90-2304.3.0.0197

kernel-source: before 4.19.90-2304.3.0.0197

kernel-debugsource: before 4.19.90-2304.3.0.0197

python2-perf-debuginfo: before 4.19.90-2304.3.0.0197

perf: before 4.19.90-2304.3.0.0197

python3-perf: before 4.19.90-2304.3.0.0197

kernel: before 4.19.90-2304.3.0.0197

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1229


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU75451

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1855

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xgene_hwmon_remove() function in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). A local user can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP3

python3-perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools: before 4.19.90-2304.3.0.0197

python2-perf: before 4.19.90-2304.3.0.0197

bpftool-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-devel: before 4.19.90-2304.3.0.0197

kernel-devel: before 4.19.90-2304.3.0.0197

bpftool: before 4.19.90-2304.3.0.0197

perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-debuginfo: before 4.19.90-2304.3.0.0197

kernel-source: before 4.19.90-2304.3.0.0197

kernel-debugsource: before 4.19.90-2304.3.0.0197

python2-perf-debuginfo: before 4.19.90-2304.3.0.0197

perf: before 4.19.90-2304.3.0.0197

python3-perf: before 4.19.90-2304.3.0.0197

kernel: before 4.19.90-2304.3.0.0197

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1229


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU75769

Risk: Medium

CVSSv3.1: 6.6 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1859

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a malicious guest to gain access to sensitive information or perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the xen_9pfs_front_removet() function in net/9p/trans_xen.c in Xen transport for 9pfs. A malicious guest VM can trigger a use-after-free error and gain access to sensitive information of the hypervisor or crash it.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP3

python3-perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools: before 4.19.90-2304.3.0.0197

python2-perf: before 4.19.90-2304.3.0.0197

bpftool-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-devel: before 4.19.90-2304.3.0.0197

kernel-devel: before 4.19.90-2304.3.0.0197

bpftool: before 4.19.90-2304.3.0.0197

perf-debuginfo: before 4.19.90-2304.3.0.0197

kernel-debuginfo: before 4.19.90-2304.3.0.0197

kernel-tools-debuginfo: before 4.19.90-2304.3.0.0197

kernel-source: before 4.19.90-2304.3.0.0197

kernel-debugsource: before 4.19.90-2304.3.0.0197

python2-perf-debuginfo: before 4.19.90-2304.3.0.0197

perf: before 4.19.90-2304.3.0.0197

python3-perf: before 4.19.90-2304.3.0.0197

kernel: before 4.19.90-2304.3.0.0197

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1229


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###