A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3710-1 | linux security update |
![]() |
USN-5850-1 | Linux kernel vulnerabilities |
![]() |
USN-5851-1 | Linux kernel vulnerabilities |
![]() |
USN-5860-1 | Linux kernel (GKE) vulnerabilities |
![]() |
USN-5876-1 | Linux kernel vulnerabilities |
![]() |
USN-5877-1 | Linux kernel (GKE) vulnerabilities |
![]() |
USN-5878-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-5879-1 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-6284-1 | Linux kernel vulnerabilities |
![]() |
USN-6301-1 | Linux kernel vulnerabilities |
![]() |
USN-6312-1 | Linux kernel vulnerabilities |
![]() |
USN-6314-1 | Linux kernel vulnerabilities |
![]() |
USN-6331-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6337-1 | Linux kernel (Azure) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T05:17:49.847Z
Reserved: 2023-01-31T00:00:00
Link: CVE-2023-0590

No data.

Status : Modified
Published: 2023-03-23T21:15:19.150
Modified: 2024-11-21T07:37:27.123
Link: CVE-2023-0590


No data.