The Linux Kernel, the operating system core itself.
Security Fix(es):
A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intelgvtdmamapguest_page function. This issue could allow a local user to crash the system.(CVE-2022-3707)
A NULL pointer dereference flaw was found in rawv6pushpending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.(CVE-2023-0394)
A use-after-free flaw was found in qdiscgraft in net/sched/schapi.c in the Linux Kernel due to a race problem leading to a denial-of-service problem.
Reference: https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/
Crash: BUG: KASAN: use-after-free in _tcfqdiscfind.part.0+0xa3a/0xac0 net/sched/clsapi.c:1066 Read of size 4 at addr ffff88802065e038 by task syz-executor.4/21027
CPU: 0 PID: 21027 Comm: syz-executor.4 Not tainted 6.0.0-rc3-syzkaller-00363-g7726d4c3e60b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:317 [inline]
print_report.cold+0x2ba/0x719 mm/kasan/report.c:433
kasan_report+0xb1/0x1e0 mm/kasan/report.c:495
__tcf_qdisc_find.part.0+0xa3a/0xac0 net/sched/cls_api.c:1066
__tcf_qdisc_find net/sched/cls_api.c:1051 [inline]
tc_new_tfilter+0x34f/0x2200 net/sched/cls_api.c:2018
rtnetlink_rcv_msg+0x955/0xca0 net/core/rtnetlink.c:6081
netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2501
netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
netlink_unicast+0x543/0x7f0 net/netlink/af_netlink.c:1345
netlink_sendmsg+0x917/0xe10 net/netlink/af_netlink.c:1921
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:734
____sys_sendmsg+0x6eb/0x810 net/socket.c:2482
___sys_sendmsg+0x110/0x1b0 net/socket.c:2536
__sys_sendmsg+0xf3/0x1c0 net/socket.c:2565
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f5efaa89279(CVE-2023-0590)
{ "severity": "High" }
{ "aarch64": [ "kernel-headers-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "perf-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "kernel-tools-devel-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "kernel-debugsource-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "kernel-tools-debuginfo-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "kernel-debuginfo-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "bpftool-debuginfo-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "python3-perf-debuginfo-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "kernel-tools-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "kernel-devel-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "perf-debuginfo-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "bpftool-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "kernel-source-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "kernel-5.10.0-60.80.0.104.oe2203.aarch64.rpm", "python3-perf-5.10.0-60.80.0.104.oe2203.aarch64.rpm" ], "x86_64": [ "perf-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-devel-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-tools-debuginfo-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "python3-perf-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-debuginfo-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-source-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "bpftool-debuginfo-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-debugsource-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "bpftool-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "perf-debuginfo-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-tools-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "python3-perf-debuginfo-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-tools-devel-5.10.0-60.80.0.104.oe2203.x86_64.rpm", "kernel-headers-5.10.0-60.80.0.104.oe2203.x86_64.rpm" ], "src": [ "kernel-5.10.0-60.80.0.104.oe2203.src.rpm" ] }