OESA-2023-1381

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1381
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1381.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1381
Upstream
Published
2023-07-01T11:05:27Z
Modified
2025-08-12T05:17:20.622419Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2023-1073)

A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.(CVE-2023-1074)

In nftablesupdtable, if nftablestableenable returns an error, nfttransdestroy is called to free the transaction object. nfttransdestroy() calls listdel(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.(CVE-2023-1095)

A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.(CVE-2023-3141)

An out of bounds (OOB) memory access flaw was found in the Linux kernel in relayfilereadstartpos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.(CVE-2023-3268)

An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.(CVE-2023-35829)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.0-60.100.0.124.oe2203

Ecosystem specific

{
    "src": [
        "kernel-5.10.0-60.100.0.124.oe2203.src.rpm"
    ],
    "x86_64": [
        "kernel-headers-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "perf-debuginfo-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "bpftool-debuginfo-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "kernel-tools-devel-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "kernel-source-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "kernel-tools-debuginfo-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "kernel-devel-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "python3-perf-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "kernel-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "bpftool-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "perf-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "kernel-debugsource-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "python3-perf-debuginfo-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "kernel-debuginfo-5.10.0-60.100.0.124.oe2203.x86_64.rpm",
        "kernel-tools-5.10.0-60.100.0.124.oe2203.x86_64.rpm"
    ],
    "aarch64": [
        "kernel-tools-debuginfo-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "bpftool-debuginfo-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "kernel-headers-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "kernel-devel-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "python3-perf-debuginfo-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "perf-debuginfo-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "perf-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "python3-perf-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "kernel-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "kernel-debugsource-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "bpftool-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "kernel-source-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "kernel-tools-devel-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "kernel-tools-5.10.0-60.100.0.124.oe2203.aarch64.rpm",
        "kernel-debuginfo-5.10.0-60.100.0.124.oe2203.aarch64.rpm"
    ]
}