<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for libpcap is now available for openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2024-2180</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2024-09-27</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2024-09-27</InitialReleaseDate>
		<CurrentReleaseDate>2024-09-27</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2024-09-27</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libpcap security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libpcap is now available for openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">This is the official web site of tcpdump, a powerful command-line  packet analyzer; and libpcap, a portable C/C++ library for  network traffic capture.

Security Fix(es):

In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns.  This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block.  A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.(CVE-2023-7256)

Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.(CVE-2024-8006)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libpcap is now available for openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libpcap</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2180</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-7256</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-8006</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-7256</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-8006</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="libpcap-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-1.10.1-4.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-debuginfo-1.10.1-4.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-debugsource-1.10.1-4.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-devel-1.10.1-4.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-1.10.4-2.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-debuginfo-1.10.4-2.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-debugsource-1.10.4-2.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-devel-1.10.4-2.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-1.10.3-2.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-debuginfo-1.10.3-2.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-debugsource-1.10.3-2.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-devel-1.10.3-2.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-1.10.3-2.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-debuginfo-1.10.3-2.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-debugsource-1.10.3-2.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-devel-1.10.3-2.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-1.9.1-7.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-debuginfo-1.9.1-7.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-debugsource-1.9.1-7.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-devel-1.9.1-7.oe2003sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="libpcap-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-1.10.1-4.oe2203sp1.src.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-1.10.4-2.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-1.10.3-2.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-1.10.3-2.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-1.9.1-7.oe2003sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="libpcap-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-1.10.1-4.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-debuginfo-1.10.1-4.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-debugsource-1.10.1-4.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-devel-1.10.1-4.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-1.10.4-2.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-debuginfo-1.10.4-2.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-debugsource-1.10.4-2.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-devel-1.10.4-2.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-1.10.3-2.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-debuginfo-1.10.3-2.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-debugsource-1.10.3-2.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-devel-1.10.3-2.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-1.10.3-2.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-debuginfo-1.10.3-2.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-debugsource-1.10.3-2.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-devel-1.10.3-2.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-1.9.1-7.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debuginfo-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-debuginfo-1.9.1-7.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-debugsource-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-debugsource-1.9.1-7.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libpcap-devel-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-devel-1.9.1-7.oe2003sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="libpcap-help-1.10.1-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libpcap-help-1.10.1-4.oe2203sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="libpcap-help-1.10.4-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libpcap-help-1.10.4-2.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="libpcap-help-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libpcap-help-1.10.3-2.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="libpcap-help-1.10.3-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libpcap-help-1.10.3-2.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="libpcap-help-1.9.1-7" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">libpcap-help-1.9.1-7.oe2003sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns.  This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block.  A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.</Note>
		</Notes>
		<ReleaseDate>2024-09-27</ReleaseDate>
		<CVE>CVE-2023-7256</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.4</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libpcap security update</Description>
				<DATE>2024-09-27</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2180</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.</Note>
		</Notes>
		<ReleaseDate>2024-09-27</ReleaseDate>
		<CVE>CVE-2024-8006</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.4</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libpcap security update</Description>
				<DATE>2024-09-27</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2180</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>