Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2023-32247 CVE-2023-3777 CVE-2023-4015 CVE-2023-4206 CVE-2023-4207 CVE-2023-4208 CVE-2023-4622 |
CWE-ID | CWE-400 CWE-399 CWE-119 CWE-416 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system kernel-debuginfo Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component python3-perf-debuginfo Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU80481
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32247
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to ksmbd does not properly control consumption of internal resources when handling SMB2_SESSION_SETUP commands. A remote attacker can send specially crafted data to the server during session setup, trigger memory exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
kernel-debuginfo: before 5.10.0-136.49.0.127
kernel-source: before 5.10.0-136.49.0.127
kernel-tools-devel: before 5.10.0-136.49.0.127
kernel-headers: before 5.10.0-136.49.0.127
kernel-tools: before 5.10.0-136.49.0.127
bpftool: before 5.10.0-136.49.0.127
kernel-tools-debuginfo: before 5.10.0-136.49.0.127
python3-perf: before 5.10.0-136.49.0.127
perf: before 5.10.0-136.49.0.127
kernel-debugsource: before 5.10.0-136.49.0.127
python3-perf-debuginfo: before 5.10.0-136.49.0.127
kernel-devel: before 5.10.0-136.49.0.127
bpftool-debuginfo: before 5.10.0-136.49.0.127
perf-debuginfo: before 5.10.0-136.49.0.127
kernel: before 5.10.0-136.49.0.127
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1635
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80121
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-3777
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper handling of table rules flush in certain circumstances within the netfilter subsystem in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack or execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
kernel-debuginfo: before 5.10.0-136.49.0.127
kernel-source: before 5.10.0-136.49.0.127
kernel-tools-devel: before 5.10.0-136.49.0.127
kernel-headers: before 5.10.0-136.49.0.127
kernel-tools: before 5.10.0-136.49.0.127
bpftool: before 5.10.0-136.49.0.127
kernel-tools-debuginfo: before 5.10.0-136.49.0.127
python3-perf: before 5.10.0-136.49.0.127
perf: before 5.10.0-136.49.0.127
kernel-debugsource: before 5.10.0-136.49.0.127
python3-perf-debuginfo: before 5.10.0-136.49.0.127
kernel-devel: before 5.10.0-136.49.0.127
bpftool-debuginfo: before 5.10.0-136.49.0.127
perf-debuginfo: before 5.10.0-136.49.0.127
kernel: before 5.10.0-136.49.0.127
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1635
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80123
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4015
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the netfilter subsystem in net/netfilter/nft_immediate.c when handling bound chain deactivation. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
kernel-debuginfo: before 5.10.0-136.49.0.127
kernel-source: before 5.10.0-136.49.0.127
kernel-tools-devel: before 5.10.0-136.49.0.127
kernel-headers: before 5.10.0-136.49.0.127
kernel-tools: before 5.10.0-136.49.0.127
bpftool: before 5.10.0-136.49.0.127
kernel-tools-debuginfo: before 5.10.0-136.49.0.127
python3-perf: before 5.10.0-136.49.0.127
perf: before 5.10.0-136.49.0.127
kernel-debugsource: before 5.10.0-136.49.0.127
python3-perf-debuginfo: before 5.10.0-136.49.0.127
kernel-devel: before 5.10.0-136.49.0.127
bpftool-debuginfo: before 5.10.0-136.49.0.127
perf-debuginfo: before 5.10.0-136.49.0.127
kernel: before 5.10.0-136.49.0.127
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1635
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80580
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4206
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the the cls_route component in Linux kernel packet scheduler. A local user can trigger a use-after-free error and execute arbitrary code on the system.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
kernel-debuginfo: before 5.10.0-136.49.0.127
kernel-source: before 5.10.0-136.49.0.127
kernel-tools-devel: before 5.10.0-136.49.0.127
kernel-headers: before 5.10.0-136.49.0.127
kernel-tools: before 5.10.0-136.49.0.127
bpftool: before 5.10.0-136.49.0.127
kernel-tools-debuginfo: before 5.10.0-136.49.0.127
python3-perf: before 5.10.0-136.49.0.127
perf: before 5.10.0-136.49.0.127
kernel-debugsource: before 5.10.0-136.49.0.127
python3-perf-debuginfo: before 5.10.0-136.49.0.127
kernel-devel: before 5.10.0-136.49.0.127
bpftool-debuginfo: before 5.10.0-136.49.0.127
perf-debuginfo: before 5.10.0-136.49.0.127
kernel: before 5.10.0-136.49.0.127
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1635
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80587
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4207
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the the cls_fw component in Linux kernel packet scheduler. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
kernel-debuginfo: before 5.10.0-136.49.0.127
kernel-source: before 5.10.0-136.49.0.127
kernel-tools-devel: before 5.10.0-136.49.0.127
kernel-headers: before 5.10.0-136.49.0.127
kernel-tools: before 5.10.0-136.49.0.127
bpftool: before 5.10.0-136.49.0.127
kernel-tools-debuginfo: before 5.10.0-136.49.0.127
python3-perf: before 5.10.0-136.49.0.127
perf: before 5.10.0-136.49.0.127
kernel-debugsource: before 5.10.0-136.49.0.127
python3-perf-debuginfo: before 5.10.0-136.49.0.127
kernel-devel: before 5.10.0-136.49.0.127
bpftool-debuginfo: before 5.10.0-136.49.0.127
perf-debuginfo: before 5.10.0-136.49.0.127
kernel: before 5.10.0-136.49.0.127
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1635
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80586
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4208
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the the cls_u32 component in Linux kernel packet scheduler. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
kernel-debuginfo: before 5.10.0-136.49.0.127
kernel-source: before 5.10.0-136.49.0.127
kernel-tools-devel: before 5.10.0-136.49.0.127
kernel-headers: before 5.10.0-136.49.0.127
kernel-tools: before 5.10.0-136.49.0.127
bpftool: before 5.10.0-136.49.0.127
kernel-tools-debuginfo: before 5.10.0-136.49.0.127
python3-perf: before 5.10.0-136.49.0.127
perf: before 5.10.0-136.49.0.127
kernel-debugsource: before 5.10.0-136.49.0.127
python3-perf-debuginfo: before 5.10.0-136.49.0.127
kernel-devel: before 5.10.0-136.49.0.127
bpftool-debuginfo: before 5.10.0-136.49.0.127
perf-debuginfo: before 5.10.0-136.49.0.127
kernel: before 5.10.0-136.49.0.127
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1635
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80583
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4622
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the unix_stream_sendpage() function in af_unix component. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 22.03 LTS SP1
kernel-debuginfo: before 5.10.0-136.49.0.127
kernel-source: before 5.10.0-136.49.0.127
kernel-tools-devel: before 5.10.0-136.49.0.127
kernel-headers: before 5.10.0-136.49.0.127
kernel-tools: before 5.10.0-136.49.0.127
bpftool: before 5.10.0-136.49.0.127
kernel-tools-debuginfo: before 5.10.0-136.49.0.127
python3-perf: before 5.10.0-136.49.0.127
perf: before 5.10.0-136.49.0.127
kernel-debugsource: before 5.10.0-136.49.0.127
python3-perf-debuginfo: before 5.10.0-136.49.0.127
kernel-devel: before 5.10.0-136.49.0.127
bpftool-debuginfo: before 5.10.0-136.49.0.127
perf-debuginfo: before 5.10.0-136.49.0.127
kernel: before 5.10.0-136.49.0.127
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1635
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.