An update for kernel is now available for openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1394
Final
1.0
1.0
2023-07-08
Initial
2023-07-08
2023-07-08
openEuler SA Tool V1.0
2023-07-08
kernel security update
An update for kernel is now available for openEuler-22.03-LTS.
The Linux Kernel, the operating system core itself.
Security Fix(es):
An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. Quoting ZDI security advisory [1]:
"This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the processing of seg6 attributes. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel."
[1] https://www.zerodayinitiative.com/advisories/ZDI-CAN-18511/(CVE-2023-2860)
A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.(CVE-2023-3006)
An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.(CVE-2023-31084)
A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.(CVE-2023-3161)
A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.(CVE-2023-3212)
** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.(CVE-2023-34256)
An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.(CVE-2023-35788)
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.(CVE-2023-35823)
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.(CVE-2023-35824)
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.(CVE-2023-35828)
An update for kernel is now available for openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
kernel
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-2860
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-3006
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-31084
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-3161
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-3212
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-34256
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-35788
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-35823
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-35824
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-35828
https://nvd.nist.gov/vuln/detail/CVE-2023-2860
https://nvd.nist.gov/vuln/detail/CVE-2023-3006
https://nvd.nist.gov/vuln/detail/CVE-2023-31084
https://nvd.nist.gov/vuln/detail/CVE-2023-3161
https://nvd.nist.gov/vuln/detail/CVE-2023-3212
https://nvd.nist.gov/vuln/detail/CVE-2023-34256
https://nvd.nist.gov/vuln/detail/CVE-2023-35788
https://nvd.nist.gov/vuln/detail/CVE-2023-35823
https://nvd.nist.gov/vuln/detail/CVE-2023-35824
https://nvd.nist.gov/vuln/detail/CVE-2023-35828
openEuler-22.03-LTS
bpftool-5.10.0-60.101.0.126.oe2203.aarch64.rpm
python3-perf-debuginfo-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-debugsource-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-tools-devel-5.10.0-60.101.0.126.oe2203.aarch64.rpm
perf-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-headers-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-5.10.0-60.101.0.126.oe2203.aarch64.rpm
bpftool-debuginfo-5.10.0-60.101.0.126.oe2203.aarch64.rpm
python3-perf-5.10.0-60.101.0.126.oe2203.aarch64.rpm
perf-debuginfo-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-source-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-tools-debuginfo-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-debuginfo-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-tools-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-devel-5.10.0-60.101.0.126.oe2203.aarch64.rpm
kernel-5.10.0-60.101.0.126.oe2203.src.rpm
perf-debuginfo-5.10.0-60.101.0.126.oe2203.x86_64.rpm
python3-perf-debuginfo-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-tools-5.10.0-60.101.0.126.oe2203.x86_64.rpm
python3-perf-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-debugsource-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-devel-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-tools-devel-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-headers-5.10.0-60.101.0.126.oe2203.x86_64.rpm
perf-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-source-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-debuginfo-5.10.0-60.101.0.126.oe2203.x86_64.rpm
bpftool-5.10.0-60.101.0.126.oe2203.x86_64.rpm
kernel-tools-debuginfo-5.10.0-60.101.0.126.oe2203.x86_64.rpm
bpftool-debuginfo-5.10.0-60.101.0.126.oe2203.x86_64.rpm
An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. Quoting ZDI security advisory [1]: This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the processing of seg6 attributes. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. [1] https://www.zerodayinitiative.com/advisories/ZDI-CAN-18511/
2023-07-08
CVE-2023-2860
openEuler-22.03-LTS
Medium
4.4
AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.
2023-07-08
CVE-2023-3006
openEuler-22.03-LTS
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.
2023-07-08
CVE-2023-31084
openEuler-22.03-LTS
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.
2023-07-08
CVE-2023-3161
openEuler-22.03-LTS
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.
2023-07-08
CVE-2023-3212
openEuler-22.03-LTS
High
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated When modifying the block device while it is mounted by the filesystem access.
2023-07-08
CVE-2023-34256
openEuler-22.03-LTS
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
2023-07-08
CVE-2023-35788
openEuler-22.03-LTS
High
7.8
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.
2023-07-08
CVE-2023-35823
openEuler-22.03-LTS
High
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.
2023-07-08
CVE-2023-35824
openEuler-22.03-LTS
High
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.
2023-07-08
CVE-2023-35828
openEuler-22.03-LTS
High
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
kernel security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1394