First published: Wed Sep 06 2023(Updated: )
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=2.5.75 | |
Linux Linux kernel | =2.6.12-rc1 | |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP8 IF01 | |
Linux Linux kernel | >=2.6.12<4.14.327 | |
Linux Linux kernel | >=4.15<4.19.295 | |
Linux Linux kernel | >=4.20<5.4.257 | |
Linux Linux kernel | >=5.5<5.10.195 | |
Linux Linux kernel | >=5.11<5.15.132 | |
Linux Linux kernel | >=5.16<6.1.53 | |
Linux Linux kernel | >=6.2<6.4.16 | |
Linux Linux kernel | >=6.5<6.5.3 | |
Debian Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4623 is a use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component that can be exploited to achieve local privilege escalation.
CVE-2023-4623 can be exploited by a local attacker to achieve privilege escalation.
The Linux kernel versions up to and including 2.5.75 and version 2.6.12-rc1 are affected by CVE-2023-4623.
CVE-2023-4623 has a severity rating of 7.8 (high).
To fix CVE-2023-4623, it is recommended to update to a patched version of the Linux kernel.