First published: Fri Jul 21 2023(Updated: )
A flaw in the Linux Kernel found. An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64</a>
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <6.5 | 6.5 |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 | |
Linux Kernel | >=3.8<6.5 | |
Linux Kernel | =6.5-rc1 | |
Linux Kernel | >=3.8<4.14.322 | |
Linux Kernel | >=4.15<4.19.291 | |
Linux Kernel | >=4.20<5.4.253 | |
Linux Kernel | >=5.5<5.10.188 | |
Linux Kernel | >=5.11<5.15.121 | |
Linux Kernel | >=5.16<6.1.40 | |
Linux Kernel | >=6.2<6.4.5 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 | |
Debian GNU/Linux | =12.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Debian | =10.0 | |
Debian | =11.0 | |
Debian | =12.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3611 is a local privilege escalation vulnerability found in the Linux Kernel's sch_qfq component.
To fix CVE-2023-3611, update to the patched version of the Linux Kernel 6.5 or later, or apply the relevant updates provided by your Linux distribution.
CVE-2023-3611 affects Linux Kernel versions prior to 6.5, including versions 3.8 through 6.4.5.
No, CVE-2023-3611 is a local privilege escalation vulnerability that requires local access to exploit.
CVE-2023-3611 specifically impacts the sch_qfq component within the Linux Kernel.