OESA-2023-1152

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1152
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1152.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1152
Upstream
Published
2023-03-10T11:05:01Z
Modified
2025-08-12T05:18:24.077324Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

Due to a vulnerability in the iouring subsystem, it is possible to leak kernel memory information to the user process. timensinstall calls currentissinglethreaded to determine if the current process is single-threaded, but this call does not consider iouring's ioworker threads, thus it is possible to insert a time namespace's vvar page to process's memory space via a page fault. When this time namespace is destroyed, the vvar page is also freed, but not removed from the process' memory, and a next page allocated by the kernel will be still available from the user-space process and can leak memory contents via this (read-only) use-after-free vulnerability. We recommend upgrading past version 5.10.161 or commit 788d0824269bef539fe31a785b1517882eafed93 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/iouring(CVE-2023-23586)

In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfsattrfind in fs/ntfs/attrib.c.(CVE-2023-26607)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.0-60.84.0.108.oe2203

Ecosystem specific

{
    "aarch64": [
        "kernel-headers-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "bpftool-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "kernel-tools-debuginfo-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "kernel-tools-devel-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "perf-debuginfo-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "kernel-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "python3-perf-debuginfo-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "perf-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "kernel-devel-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "kernel-debugsource-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "kernel-source-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "kernel-tools-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "bpftool-debuginfo-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "python3-perf-5.10.0-60.84.0.108.oe2203.aarch64.rpm",
        "kernel-debuginfo-5.10.0-60.84.0.108.oe2203.aarch64.rpm"
    ],
    "x86_64": [
        "kernel-tools-devel-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "bpftool-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "kernel-devel-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "perf-debuginfo-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "kernel-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "kernel-debuginfo-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "python3-perf-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "python3-perf-debuginfo-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "kernel-debugsource-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "bpftool-debuginfo-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "kernel-source-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "perf-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "kernel-tools-debuginfo-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "kernel-tools-5.10.0-60.84.0.108.oe2203.x86_64.rpm",
        "kernel-headers-5.10.0-60.84.0.108.oe2203.x86_64.rpm"
    ],
    "src": [
        "kernel-5.10.0-60.84.0.108.oe2203.src.rpm"
    ]
}