{"id":"OESA-2024-1032","summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\r\n\r\nopeneuler-linux-kernel-5.10.149-ext4_write_inline_data-kernel_bug-365020(CVE-2021-33631)\r\n\r\nAn issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.(CVE-2023-35827)\r\n\r\nAn out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.(CVE-2023-6606)\r\n\r\nAn out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.(CVE-2023-6610)\r\n\r\nA use-after-free vulnerability in the Linux kernel&apos;s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\r\n\r\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.\r\n\r\n(CVE-2023-6817)\r\n\r\nA heap out-of-bounds write vulnerability in the Linux kernel&apos;s Performance Events system component can be exploited to achieve local privilege escalation.\r\n\r\nA perf_event&apos;s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\r\n\r\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.\r\n\r\n(CVE-2023-6931)\r\n\r\nA use-after-free vulnerability in the Linux kernel&apos;s ipv4: igmp component can be exploited to achieve local privilege escalation.\r\n\r\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\r\n\r\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.\r\n\r\n(CVE-2023-6932)","modified":"2026-03-11T06:38:56.405042Z","published":"2024-01-12T11:06:43Z","upstream":["CVE-2021-33631","CVE-2023-35827","CVE-2023-6606","CVE-2023-6610","CVE-2023-6817","CVE-2023-6931","CVE-2023-6932"],"database_specific":{"severity":"High"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1032"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35827"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6606"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6610"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6817"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6932"}],"affected":[{"package":{"name":"kernel","ecosystem":"openEuler:22.03-LTS","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.0-60.121.0.148.oe2203"}]}],"ecosystem_specific":{"x86_64":["kernel-headers-5.10.0-60.121.0.148.oe2203.x86_64.rpm","python3-perf-debuginfo-5.10.0-60.121.0.148.oe2203.x86_64.rpm","kernel-debugsource-5.10.0-60.121.0.148.oe2203.x86_64.rpm","perf-5.10.0-60.121.0.148.oe2203.x86_64.rpm","perf-debuginfo-5.10.0-60.121.0.148.oe2203.x86_64.rpm","kernel-tools-debuginfo-5.10.0-60.121.0.148.oe2203.x86_64.rpm","kernel-5.10.0-60.121.0.148.oe2203.x86_64.rpm","kernel-tools-5.10.0-60.121.0.148.oe2203.x86_64.rpm","kernel-source-5.10.0-60.121.0.148.oe2203.x86_64.rpm","kernel-devel-5.10.0-60.121.0.148.oe2203.x86_64.rpm","bpftool-5.10.0-60.121.0.148.oe2203.x86_64.rpm","kernel-debuginfo-5.10.0-60.121.0.148.oe2203.x86_64.rpm","bpftool-debuginfo-5.10.0-60.121.0.148.oe2203.x86_64.rpm","kernel-tools-devel-5.10.0-60.121.0.148.oe2203.x86_64.rpm","python3-perf-5.10.0-60.121.0.148.oe2203.x86_64.rpm"],"src":["kernel-5.10.0-60.121.0.148.oe2203.src.rpm"],"aarch64":["kernel-5.10.0-60.121.0.148.oe2203.aarch64.rpm","kernel-tools-5.10.0-60.121.0.148.oe2203.aarch64.rpm","python3-perf-5.10.0-60.121.0.148.oe2203.aarch64.rpm","python3-perf-debuginfo-5.10.0-60.121.0.148.oe2203.aarch64.rpm","bpftool-debuginfo-5.10.0-60.121.0.148.oe2203.aarch64.rpm","kernel-headers-5.10.0-60.121.0.148.oe2203.aarch64.rpm","kernel-debuginfo-5.10.0-60.121.0.148.oe2203.aarch64.rpm","kernel-source-5.10.0-60.121.0.148.oe2203.aarch64.rpm","bpftool-5.10.0-60.121.0.148.oe2203.aarch64.rpm","kernel-debugsource-5.10.0-60.121.0.148.oe2203.aarch64.rpm","perf-debuginfo-5.10.0-60.121.0.148.oe2203.aarch64.rpm","kernel-tools-devel-5.10.0-60.121.0.148.oe2203.aarch64.rpm","kernel-tools-debuginfo-5.10.0-60.121.0.148.oe2203.aarch64.rpm","perf-5.10.0-60.121.0.148.oe2203.aarch64.rpm","kernel-devel-5.10.0-60.121.0.148.oe2203.aarch64.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2024-1032.json"}}],"schema_version":"1.7.5"}