OESA-2023-1228

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1228
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1228.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1228
Upstream
Published
2023-04-14T11:05:10Z
Modified
2025-08-12T05:16:13.285113Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

A use-after-free flaw was found in btrfssearchslot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea(CVE-2023-1611)

A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.(CVE-2023-1670)

A use-after-free flaw was found in xen9pfsfrontremovet in net/9p/transxen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.(CVE-2023-1859)

A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.(CVE-2023-1582)

A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the registernetdevice function fails (NETDEVREGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-4744)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.0-60.90.0.114.oe2203

Ecosystem specific

{
    "src": [
        "kernel-5.10.0-60.90.0.114.oe2203.src.rpm"
    ],
    "x86_64": [
        "python3-perf-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-tools-devel-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "perf-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "perf-debuginfo-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-source-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-debuginfo-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-headers-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "bpftool-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "bpftool-debuginfo-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-tools-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "python3-perf-debuginfo-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-debugsource-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-devel-5.10.0-60.90.0.114.oe2203.x86_64.rpm",
        "kernel-tools-debuginfo-5.10.0-60.90.0.114.oe2203.x86_64.rpm"
    ],
    "aarch64": [
        "kernel-devel-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "kernel-tools-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "perf-debuginfo-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "bpftool-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "python3-perf-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "python3-perf-debuginfo-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "kernel-headers-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "bpftool-debuginfo-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "kernel-tools-debuginfo-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "kernel-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "perf-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "kernel-tools-devel-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "kernel-source-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "kernel-debuginfo-5.10.0-60.90.0.114.oe2203.aarch64.rpm",
        "kernel-debugsource-5.10.0-60.90.0.114.oe2203.aarch64.rpm"
    ]
}