发布于3月6日3月6日 Members Ubuntu: (Multiple Advisories) (CVE-2023-0590): Linux kernel vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:S/C:N/I:N/A:C) Published 02/09/2023 Created 03/29/2023 Added 03/22/2023 Modified 01/30/2025 Description A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected. Solution(s) ubuntu-upgrade-linux-image-5-15-0-1015-gkeop ubuntu-upgrade-linux-image-5-15-0-1024-raspi ubuntu-upgrade-linux-image-5-15-0-1024-raspi-nolpae ubuntu-upgrade-linux-image-5-15-0-1025-ibm ubuntu-upgrade-linux-image-5-15-0-1025-intel-iotg ubuntu-upgrade-linux-image-5-15-0-1027-gke ubuntu-upgrade-linux-image-5-15-0-1028-kvm ubuntu-upgrade-linux-image-5-15-0-1029-gcp ubuntu-upgrade-linux-image-5-15-0-1029-oracle ubuntu-upgrade-linux-image-5-15-0-1030-aws ubuntu-upgrade-linux-image-5-15-0-1033-azure ubuntu-upgrade-linux-image-5-15-0-1033-azure-fde ubuntu-upgrade-linux-image-5-15-0-60-generic ubuntu-upgrade-linux-image-5-15-0-60-generic-64k ubuntu-upgrade-linux-image-5-15-0-60-generic-lpae ubuntu-upgrade-linux-image-5-15-0-60-lowlatency ubuntu-upgrade-linux-image-5-15-0-60-lowlatency-64k ubuntu-upgrade-linux-image-5-19-0-1013-raspi ubuntu-upgrade-linux-image-5-19-0-1013-raspi-nolpae ubuntu-upgrade-linux-image-5-19-0-1017-gcp ubuntu-upgrade-linux-image-5-19-0-1017-ibm ubuntu-upgrade-linux-image-5-19-0-1017-lowlatency ubuntu-upgrade-linux-image-5-19-0-1017-lowlatency-64k ubuntu-upgrade-linux-image-5-19-0-1017-oracle ubuntu-upgrade-linux-image-5-19-0-1018-kvm ubuntu-upgrade-linux-image-5-19-0-1019-aws ubuntu-upgrade-linux-image-5-19-0-1020-azure ubuntu-upgrade-linux-image-5-19-0-31-generic ubuntu-upgrade-linux-image-5-19-0-31-generic-64k ubuntu-upgrade-linux-image-5-19-0-31-generic-lpae ubuntu-upgrade-linux-image-5-19-0-32-generic ubuntu-upgrade-linux-image-5-19-0-32-generic-64k ubuntu-upgrade-linux-image-5-19-0-32-generic-lpae ubuntu-upgrade-linux-image-5-4-0-1019-iot ubuntu-upgrade-linux-image-5-4-0-1027-xilinx-zynqmp ubuntu-upgrade-linux-image-5-4-0-1054-ibm ubuntu-upgrade-linux-image-5-4-0-1068-bluefield ubuntu-upgrade-linux-image-5-4-0-1074-gkeop ubuntu-upgrade-linux-image-5-4-0-1091-raspi ubuntu-upgrade-linux-image-5-4-0-1096-kvm ubuntu-upgrade-linux-image-5-4-0-1105-gke ubuntu-upgrade-linux-image-5-4-0-1106-oracle ubuntu-upgrade-linux-image-5-4-0-1107-aws ubuntu-upgrade-linux-image-5-4-0-1110-gcp ubuntu-upgrade-linux-image-5-4-0-1113-azure ubuntu-upgrade-linux-image-5-4-0-1114-azure ubuntu-upgrade-linux-image-5-4-0-156-generic ubuntu-upgrade-linux-image-5-4-0-156-generic-lpae ubuntu-upgrade-linux-image-5-4-0-156-lowlatency ubuntu-upgrade-linux-image-aws ubuntu-upgrade-linux-image-aws-lts-20-04 ubuntu-upgrade-linux-image-aws-lts-22-04 ubuntu-upgrade-linux-image-azure ubuntu-upgrade-linux-image-azure-fde ubuntu-upgrade-linux-image-azure-lts-20-04 ubuntu-upgrade-linux-image-azure-lts-22-04 ubuntu-upgrade-linux-image-bluefield ubuntu-upgrade-linux-image-gcp ubuntu-upgrade-linux-image-gcp-lts-20-04 ubuntu-upgrade-linux-image-generic ubuntu-upgrade-linux-image-generic-64k ubuntu-upgrade-linux-image-generic-64k-hwe-20-04 ubuntu-upgrade-linux-image-generic-64k-hwe-22-04 ubuntu-upgrade-linux-image-generic-hwe-18-04 ubuntu-upgrade-linux-image-generic-hwe-20-04 ubuntu-upgrade-linux-image-generic-hwe-22-04 ubuntu-upgrade-linux-image-generic-lpae ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04 ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04 ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04 ubuntu-upgrade-linux-image-gke ubuntu-upgrade-linux-image-gke-5-15 ubuntu-upgrade-linux-image-gke-5-4 ubuntu-upgrade-linux-image-gkeop ubuntu-upgrade-linux-image-gkeop-5-15 ubuntu-upgrade-linux-image-gkeop-5-4 ubuntu-upgrade-linux-image-ibm ubuntu-upgrade-linux-image-ibm-lts-20-04 ubuntu-upgrade-linux-image-intel-iotg ubuntu-upgrade-linux-image-kvm ubuntu-upgrade-linux-image-lowlatency ubuntu-upgrade-linux-image-lowlatency-64k ubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04 ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04 ubuntu-upgrade-linux-image-lowlatency-hwe-18-04 ubuntu-upgrade-linux-image-lowlatency-hwe-20-04 ubuntu-upgrade-linux-image-lowlatency-hwe-22-04 ubuntu-upgrade-linux-image-oem ubuntu-upgrade-linux-image-oem-osp1 ubuntu-upgrade-linux-image-oracle ubuntu-upgrade-linux-image-oracle-lts-20-04 ubuntu-upgrade-linux-image-raspi ubuntu-upgrade-linux-image-raspi-hwe-18-04 ubuntu-upgrade-linux-image-raspi-nolpae ubuntu-upgrade-linux-image-raspi2 ubuntu-upgrade-linux-image-snapdragon-hwe-18-04 ubuntu-upgrade-linux-image-virtual ubuntu-upgrade-linux-image-virtual-hwe-18-04 ubuntu-upgrade-linux-image-virtual-hwe-20-04 ubuntu-upgrade-linux-image-virtual-hwe-22-04 ubuntu-upgrade-linux-image-xilinx-zynqmp References https://attackerkb.com/topics/cve-2023-0590 CVE - 2023-0590 USN-5850-1 USN-5851-1 USN-5860-1 USN-5876-1 USN-5877-1 USN-5878-1 USN-5879-1 USN-6284-1 USN-6301-1 USN-6312-1 USN-6314-1 USN-6331-1 USN-6337-1 View more