Anolis OS update for kernel



| Updated: 2025-03-29
Risk Medium
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2022-47929
CVE-2023-0386
CVE-2023-1075
CVE-2023-1380
CVE-2023-26545
CVE-2023-28466
CVE-2023-30456
CVE-2023-32233
CWE-ID CWE-476
CWE-264
CWE-843
CWE-125
CWE-415
CWE-362
CWE-20
CWE-416
Exploitation vector Local
Public exploit Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #8 is available.
Vulnerable software
Anolis OS
Operating systems & Components / Operating system

python3-perf
Operating systems & Components / Operating system package or component

perf
Operating systems & Components / Operating system package or component

kernel-tools-libs-devel
Operating systems & Components / Operating system package or component

kernel-tools-libs
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-modules-internal
Operating systems & Components / Operating system package or component

kernel-modules-extra
Operating systems & Components / Operating system package or component

kernel-modules
Operating systems & Components / Operating system package or component

kernel-headers
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-debug-modules-extra
Operating systems & Components / Operating system package or component

kernel-debug-modules
Operating systems & Components / Operating system package or component

kernel-debug-devel
Operating systems & Components / Operating system package or component

kernel-debug-core
Operating systems & Components / Operating system package or component

kernel-debug
Operating systems & Components / Operating system package or component

kernel-core
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

Vendor OpenAnolis

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU71479

Risk: Medium

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47929

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the traffic control subsystem in Linux kernel. A local user can pass pass a specially crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-perf: before 5.10.134-14.1

perf: before 5.10.134-14.1

kernel-tools-libs-devel: before 5.10.134-14.1

kernel-tools-libs: before 5.10.134-14.1

kernel-tools: before 5.10.134-14.1

kernel-modules-internal: before 5.10.134-14.1

kernel-modules-extra: before 5.10.134-14.1

kernel-modules: before 5.10.134-14.1

kernel-headers: before 5.10.134-14.1

kernel-devel: before 5.10.134-14.1

kernel-debug-modules-extra: before 5.10.134-14.1

kernel-debug-modules: before 5.10.134-14.1

kernel-debug-devel: before 5.10.134-14.1

kernel-debug-core: before 5.10.134-14.1

kernel-debug: before 5.10.134-14.1

kernel-core: before 5.10.134-14.1

kernel: before 5.10.134-14.1

bpftool: before 5.10.134-14.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0200


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU74410

Risk: Low

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]

CVE-ID: CVE-2023-0386

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to unauthorized access to execution of setuid files in OverlayFS subsystem when copying a capable file from a nosuid mount into another mount. A local user can execute arbitrary code with root privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-perf: before 5.10.134-14.1

perf: before 5.10.134-14.1

kernel-tools-libs-devel: before 5.10.134-14.1

kernel-tools-libs: before 5.10.134-14.1

kernel-tools: before 5.10.134-14.1

kernel-modules-internal: before 5.10.134-14.1

kernel-modules-extra: before 5.10.134-14.1

kernel-modules: before 5.10.134-14.1

kernel-headers: before 5.10.134-14.1

kernel-devel: before 5.10.134-14.1

kernel-debug-modules-extra: before 5.10.134-14.1

kernel-debug-modules: before 5.10.134-14.1

kernel-debug-devel: before 5.10.134-14.1

kernel-debug-core: before 5.10.134-14.1

kernel-debug: before 5.10.134-14.1

kernel-core: before 5.10.134-14.1

kernel: before 5.10.134-14.1

bpftool: before 5.10.134-14.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0200


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

3) Type Confusion

EUVDB-ID: #VU72700

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-1075

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a type confusion error within the tls_is_tx_ready() function in the net/tls stack of the Linux Kernel. A local user can trigger a type confusion error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-perf: before 5.10.134-14.1

perf: before 5.10.134-14.1

kernel-tools-libs-devel: before 5.10.134-14.1

kernel-tools-libs: before 5.10.134-14.1

kernel-tools: before 5.10.134-14.1

kernel-modules-internal: before 5.10.134-14.1

kernel-modules-extra: before 5.10.134-14.1

kernel-modules: before 5.10.134-14.1

kernel-headers: before 5.10.134-14.1

kernel-devel: before 5.10.134-14.1

kernel-debug-modules-extra: before 5.10.134-14.1

kernel-debug-modules: before 5.10.134-14.1

kernel-debug-devel: before 5.10.134-14.1

kernel-debug-core: before 5.10.134-14.1

kernel-debug: before 5.10.134-14.1

kernel-core: before 5.10.134-14.1

kernel: before 5.10.134-14.1

bpftool: before 5.10.134-14.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0200


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU73280

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-1380

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Broadcom Full MAC Wi-Fi driver (brcmfmac.ko). A local user can trigger an out-of-bounds read error and read contents of kernel memory on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-perf: before 5.10.134-14.1

perf: before 5.10.134-14.1

kernel-tools-libs-devel: before 5.10.134-14.1

kernel-tools-libs: before 5.10.134-14.1

kernel-tools: before 5.10.134-14.1

kernel-modules-internal: before 5.10.134-14.1

kernel-modules-extra: before 5.10.134-14.1

kernel-modules: before 5.10.134-14.1

kernel-headers: before 5.10.134-14.1

kernel-devel: before 5.10.134-14.1

kernel-debug-modules-extra: before 5.10.134-14.1

kernel-debug-modules: before 5.10.134-14.1

kernel-debug-devel: before 5.10.134-14.1

kernel-debug-core: before 5.10.134-14.1

kernel-debug: before 5.10.134-14.1

kernel-core: before 5.10.134-14.1

kernel: before 5.10.134-14.1

bpftool: before 5.10.134-14.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0200


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Double Free

EUVDB-ID: #VU73766

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-26545

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a double free in net/mpls/af_mpls.c during the renaming of a device. A local user can trigger a double free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-perf: before 5.10.134-14.1

perf: before 5.10.134-14.1

kernel-tools-libs-devel: before 5.10.134-14.1

kernel-tools-libs: before 5.10.134-14.1

kernel-tools: before 5.10.134-14.1

kernel-modules-internal: before 5.10.134-14.1

kernel-modules-extra: before 5.10.134-14.1

kernel-modules: before 5.10.134-14.1

kernel-headers: before 5.10.134-14.1

kernel-devel: before 5.10.134-14.1

kernel-debug-modules-extra: before 5.10.134-14.1

kernel-debug-modules: before 5.10.134-14.1

kernel-debug-devel: before 5.10.134-14.1

kernel-debug-core: before 5.10.134-14.1

kernel-debug: before 5.10.134-14.1

kernel-core: before 5.10.134-14.1

kernel: before 5.10.134-14.1

bpftool: before 5.10.134-14.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0200


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Race condition

EUVDB-ID: #VU74628

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-28466

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition caused by a missing lock_sock call within the do_tls_getsockopt() function in net/tls/tls_main.c. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-perf: before 5.10.134-14.1

perf: before 5.10.134-14.1

kernel-tools-libs-devel: before 5.10.134-14.1

kernel-tools-libs: before 5.10.134-14.1

kernel-tools: before 5.10.134-14.1

kernel-modules-internal: before 5.10.134-14.1

kernel-modules-extra: before 5.10.134-14.1

kernel-modules: before 5.10.134-14.1

kernel-headers: before 5.10.134-14.1

kernel-devel: before 5.10.134-14.1

kernel-debug-modules-extra: before 5.10.134-14.1

kernel-debug-modules: before 5.10.134-14.1

kernel-debug-devel: before 5.10.134-14.1

kernel-debug-core: before 5.10.134-14.1

kernel-debug: before 5.10.134-14.1

kernel-core: before 5.10.134-14.1

kernel: before 5.10.134-14.1

bpftool: before 5.10.134-14.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0200


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Input validation error

EUVDB-ID: #VU75456

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-30456

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of consistency for for CR0 and CR4 in arch/x86/kvm/vmx/nested.c in the Linux kernel. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-perf: before 5.10.134-14.1

perf: before 5.10.134-14.1

kernel-tools-libs-devel: before 5.10.134-14.1

kernel-tools-libs: before 5.10.134-14.1

kernel-tools: before 5.10.134-14.1

kernel-modules-internal: before 5.10.134-14.1

kernel-modules-extra: before 5.10.134-14.1

kernel-modules: before 5.10.134-14.1

kernel-headers: before 5.10.134-14.1

kernel-devel: before 5.10.134-14.1

kernel-debug-modules-extra: before 5.10.134-14.1

kernel-debug-modules: before 5.10.134-14.1

kernel-debug-devel: before 5.10.134-14.1

kernel-debug-core: before 5.10.134-14.1

kernel-debug: before 5.10.134-14.1

kernel-core: before 5.10.134-14.1

kernel: before 5.10.134-14.1

bpftool: before 5.10.134-14.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0200


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU75807

Risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2023-32233

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in Netfilter nf_tables when processing batch requests. A local user can trigger a use-after-free error and execute arbitrary code with root privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-perf: before 5.10.134-14.1

perf: before 5.10.134-14.1

kernel-tools-libs-devel: before 5.10.134-14.1

kernel-tools-libs: before 5.10.134-14.1

kernel-tools: before 5.10.134-14.1

kernel-modules-internal: before 5.10.134-14.1

kernel-modules-extra: before 5.10.134-14.1

kernel-modules: before 5.10.134-14.1

kernel-headers: before 5.10.134-14.1

kernel-devel: before 5.10.134-14.1

kernel-debug-modules-extra: before 5.10.134-14.1

kernel-debug-modules: before 5.10.134-14.1

kernel-debug-devel: before 5.10.134-14.1

kernel-debug-core: before 5.10.134-14.1

kernel-debug: before 5.10.134-14.1

kernel-core: before 5.10.134-14.1

kernel: before 5.10.134-14.1

bpftool: before 5.10.134-14.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0200


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###