An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.
The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.
We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.
We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3623-1 | linux-5.10 security update |
![]() |
DLA-3710-1 | linux security update |
![]() |
DSA-5480-1 | linux security update |
![]() |
DSA-5492-1 | linux security update |
![]() |
EUVD-2023-44260 | An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64. |
![]() |
USN-6285-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6309-1 | Linux kernel vulnerabilities |
![]() |
USN-6315-1 | Linux kernel vulnerabilities |
![]() |
USN-6317-1 | Linux kernel vulnerabilities |
![]() |
USN-6318-1 | Linux kernel vulnerabilities |
![]() |
USN-6321-1 | Linux kernel vulnerabilities |
![]() |
USN-6324-1 | Linux kernel (GKE) vulnerabilities |
![]() |
USN-6325-1 | Linux kernel vulnerabilities |
![]() |
USN-6327-1 | Linux kernel (KVM) vulnerabilities |
![]() |
USN-6328-1 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6329-1 | Linux kernel vulnerabilities |
![]() |
USN-6330-1 | Linux kernel (GCP) vulnerabilities |
![]() |
USN-6331-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6332-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6341-1 | Linux kernel vulnerabilities |
![]() |
USN-6342-1 | Linux kernel vulnerabilities |
![]() |
USN-6342-2 | Linux kernel (Azure) |
![]() |
USN-6346-1 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-6348-1 | Linux kernel vulnerabilities |
![]() |
USN-6357-1 | Linux kernel (IBM) vulnerabilities |
![]() |
USN-6385-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6397-1 | Linux kernel (BlueField) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64. | An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64. |
Fri, 27 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux kernel
|
|
CPEs | cpe:2.3:o:linux:kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux kernel
|
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T16:56:15.625Z
Reserved: 2023-07-10T20:52:55.365Z
Link: CVE-2023-3611

Updated: 2024-08-02T07:01:57.288Z

Status : Modified
Published: 2023-07-21T21:15:11.897
Modified: 2025-02-13T17:16:58.047
Link: CVE-2023-3611


No data.