OESA-2023-1072

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1072
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1072.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1072
Upstream
Published
2023-02-10T11:04:52Z
Modified
2025-08-12T05:16:42.803466Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.(CVE-2023-0179)

atmtcenqueue in net/sched/schatm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TCACT_SHOT condition rather than valid classification results).(CVE-2023-23455)

cbqclassify in net/sched/schcbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TCACTSHOT condition rather than valid classification results).(CVE-2023-23454)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP1 / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.0-136.17.0.93.oe2203sp1

Ecosystem specific

{
    "aarch64": [
        "kernel-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "kernel-headers-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "perf-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "bpftool-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "python3-perf-debuginfo-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "perf-debuginfo-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "kernel-tools-devel-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "kernel-devel-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "kernel-tools-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "kernel-tools-debuginfo-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "kernel-debugsource-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "python3-perf-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "kernel-source-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "bpftool-debuginfo-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm",
        "kernel-debuginfo-5.10.0-136.17.0.93.oe2203sp1.aarch64.rpm"
    ],
    "x86_64": [
        "kernel-debugsource-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "perf-debuginfo-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "kernel-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "perf-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "kernel-tools-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "kernel-source-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "python3-perf-debuginfo-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "bpftool-debuginfo-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "kernel-tools-devel-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "kernel-devel-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "kernel-headers-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "kernel-debuginfo-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "python3-perf-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "bpftool-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm",
        "kernel-tools-debuginfo-5.10.0-136.17.0.93.oe2203sp1.x86_64.rpm"
    ],
    "src": [
        "kernel-5.10.0-136.17.0.93.oe2203sp1.src.rpm"
    ]
}