OESA-2022-1927

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1927
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1927.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-1927
Upstream
Published
2022-09-16T11:04:18Z
Modified
2025-08-12T05:13:15.549801Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

An issue was discovered in the Linux kernel before 5.19. In pxa3xxgcuwrite in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of sizet versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copyfrom_user(), a heap overflow may occur.(CVE-2022-39842)

An issue was discovered in net/netfilter/nftablesapi.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.(CVE-2022-39190)

An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVMVCPUPREEMPTED situations.(CVE-2022-39189)

Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn t check the value of pixclock , so it may cause a divide by zero error.(CVE-2022-3061)

An issue was found in the Linux kernel in nfconntrackirc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nfconntrackirc configured.(CVE-2022-2663)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.0-60.56.0.84.oe2203

Ecosystem specific

{
    "src": [
        "kernel-5.10.0-60.56.0.84.oe2203.src.rpm"
    ],
    "aarch64": [
        "bpftool-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-tools-devel-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-tools-debuginfo-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-debugsource-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-devel-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-tools-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "perf-debuginfo-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "perf-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "python3-perf-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-source-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "python3-perf-debuginfo-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "bpftool-debuginfo-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-headers-5.10.0-60.56.0.84.oe2203.aarch64.rpm",
        "kernel-debuginfo-5.10.0-60.56.0.84.oe2203.aarch64.rpm"
    ],
    "x86_64": [
        "kernel-tools-devel-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "kernel-tools-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "perf-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "kernel-debugsource-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "kernel-debuginfo-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "perf-debuginfo-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "python3-perf-debuginfo-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "kernel-tools-debuginfo-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "bpftool-debuginfo-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "kernel-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "kernel-headers-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "kernel-source-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "kernel-devel-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "bpftool-5.10.0-60.56.0.84.oe2203.x86_64.rpm",
        "python3-perf-5.10.0-60.56.0.84.oe2203.x86_64.rpm"
    ]
}