{"schema_version":"1.7.2","id":"OESA-2023-1284","modified":"2023-05-19T11:05:16Z","published":"2023-05-19T11:05:16Z","upstream":["CVE-2023-2002","CVE-2023-0458","CVE-2023-2483","CVE-2023-32269","CVE-2023-26544","CVE-2023-0459","CVE-2023-2177","CVE-2023-2513"],"summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\r\n\r\nA vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.(CVE-2023-2002)\r\n\r\nA speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the \u0026apos;rlim\u0026apos; variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11(CVE-2023-0458)\r\n\r\nIn emac_probe, \u0026amp;adpt-\u0026gt;work_thread is bound with emac_work_thread. Then it will be started by timeout handler emac_tx_timeout or a IRQ handler emac_isr. If we remove the driver which will call emac_remove to make cleanup, there may be a unfinished work. This could lead to a use-after-free.\r\n\r\nUpstream fix:\nhttps://github.com/torvalds/linux/commit/6b6bc5b8bd2d(CVE-2023-2483)\r\n\r\nAn issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.(CVE-2023-32269)\r\n\r\nIn the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.(CVE-2023-26544)\n\nNo description is available for this CVE(CVE-2023-0459)\n\nA null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.(CVE-2023-2177)\n\nA use-after-free vulnerability was found in the Linux kernel\u0026apos;s ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.(CVE-2023-2513)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"kernel","purl":"pkg:rpm/openEuler/kernel\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.19.90-2305.2.0.0201.oe1"}]}],"ecosystem_specific":{"aarch64":["perf-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-tools-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","python3-perf-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","python3-perf-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-tools-devel-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-debugsource-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","bpftool-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","perf-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","bpftool-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-tools-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","python2-perf-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-devel-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","python2-perf-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-source-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm"],"src":["kernel-4.19.90-2305.2.0.0201.oe1.src.rpm"],"x86_64":["kernel-source-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","python3-perf-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","bpftool-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","python2-perf-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-tools-devel-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-debugsource-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-devel-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-tools-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","perf-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","bpftool-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","perf-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","python3-perf-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","python2-perf-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-tools-4.19.90-2305.2.0.0201.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"kernel","purl":"pkg:rpm/openEuler/kernel\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.19.90-2305.2.0.0201.oe1"}]}],"ecosystem_specific":{"aarch64":["python3-perf-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-source-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-tools-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-devel-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","bpftool-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-tools-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","python2-perf-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-debugsource-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","bpftool-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","python2-perf-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-tools-devel-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","python3-perf-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","perf-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","kernel-debuginfo-4.19.90-2305.2.0.0201.oe1.aarch64.rpm","perf-4.19.90-2305.2.0.0201.oe1.aarch64.rpm"],"src":["kernel-4.19.90-2305.2.0.0201.oe1.src.rpm"],"x86_64":["kernel-tools-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-tools-devel-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","perf-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","python3-perf-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","python2-perf-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-tools-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","bpftool-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","perf-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","python3-perf-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","bpftool-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-debugsource-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-source-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","python2-perf-debuginfo-4.19.90-2305.2.0.0201.oe1.x86_64.rpm","kernel-devel-4.19.90-2305.2.0.0201.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"kernel","purl":"pkg:rpm/openEuler/kernel\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.0-136.32.0.108.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["kernel-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-tools-devel-5.10.0-60.94.0.118.oe2203.aarch64.rpm","python3-perf-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-tools-5.10.0-60.94.0.118.oe2203.aarch64.rpm","perf-5.10.0-60.94.0.118.oe2203.aarch64.rpm","bpftool-5.10.0-60.94.0.118.oe2203.aarch64.rpm","bpftool-debuginfo-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-source-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-devel-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-headers-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-debuginfo-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-debugsource-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-tools-debuginfo-5.10.0-60.94.0.118.oe2203.aarch64.rpm","perf-debuginfo-5.10.0-60.94.0.118.oe2203.aarch64.rpm","python3-perf-debuginfo-5.10.0-60.94.0.118.oe2203.aarch64.rpm","kernel-tools-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","bpftool-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","bpftool-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-devel-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-tools-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-debugsource-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-tools-devel-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","perf-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","python3-perf-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-source-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-headers-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","perf-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","python3-perf-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm"],"src":["kernel-5.10.0-60.94.0.118.oe2203.src.rpm","kernel-5.10.0-136.32.0.108.oe2203sp1.src.rpm"],"x86_64":["kernel-headers-5.10.0-60.94.0.118.oe2203.x86_64.rpm","kernel-tools-5.10.0-60.94.0.118.oe2203.x86_64.rpm","python3-perf-debuginfo-5.10.0-60.94.0.118.oe2203.x86_64.rpm","python3-perf-5.10.0-60.94.0.118.oe2203.x86_64.rpm","bpftool-debuginfo-5.10.0-60.94.0.118.oe2203.x86_64.rpm","bpftool-5.10.0-60.94.0.118.oe2203.x86_64.rpm","kernel-devel-5.10.0-60.94.0.118.oe2203.x86_64.rpm","perf-debuginfo-5.10.0-60.94.0.118.oe2203.x86_64.rpm","kernel-tools-devel-5.10.0-60.94.0.118.oe2203.x86_64.rpm","perf-5.10.0-60.94.0.118.oe2203.x86_64.rpm","kernel-tools-debuginfo-5.10.0-60.94.0.118.oe2203.x86_64.rpm","kernel-5.10.0-60.94.0.118.oe2203.x86_64.rpm","kernel-debugsource-5.10.0-60.94.0.118.oe2203.x86_64.rpm","kernel-source-5.10.0-60.94.0.118.oe2203.x86_64.rpm","kernel-debuginfo-5.10.0-60.94.0.118.oe2203.x86_64.rpm","perf-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","perf-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-tools-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-source-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-headers-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-debugsource-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-devel-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","python3-perf-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-tools-devel-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-tools-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","python3-perf-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","bpftool-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","bpftool-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"kernel","purl":"pkg:rpm/openEuler/kernel\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.0-136.32.0.108.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["kernel-tools-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","bpftool-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","bpftool-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-devel-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-tools-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-debugsource-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-tools-devel-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","perf-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","python3-perf-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-source-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","kernel-headers-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","perf-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm","python3-perf-debuginfo-5.10.0-136.32.0.108.oe2203sp1.aarch64.rpm"],"src":["kernel-5.10.0-136.32.0.108.oe2203sp1.src.rpm"],"x86_64":["perf-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","perf-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-tools-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-source-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-headers-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-debugsource-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-devel-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","python3-perf-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-tools-devel-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-tools-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","python3-perf-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","bpftool-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","kernel-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm","bpftool-debuginfo-5.10.0-136.32.0.108.oe2203sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1284"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2483"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32269"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26544"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0459"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2513"}],"database_specific":{"severity":"High"}}