qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3446-1 | linux-5.10 security update |
Debian DSA |
DSA-5402-1 | linux security update |
EUVD |
EUVD-2023-35744 | qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX. |
Ubuntu USN |
USN-6127-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6130-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6131-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6132-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6135-1 | Linux kernel (Azure CVM) vulnerabilities |
Ubuntu USN |
USN-6149-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6150-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6162-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6173-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6175-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6186-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6222-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-6256-1 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-6385-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6460-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 21 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-21T16:01:13.471Z
Reserved: 2023-04-28T00:00:00
Link: CVE-2023-31436
Updated: 2024-08-02T14:53:30.606Z
Status : Modified
Published: 2023-04-28T02:15:09.007
Modified: 2024-11-21T08:01:51.587
Link: CVE-2023-31436
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN