First published: Tue Sep 12 2023(Updated: )
A flaw in the Linux Kernel found. A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). References: <a href="https://github.com/torvalds/linux/commit/8fc134fee27f2263988ae38920bc03da416b03d8">https://github.com/torvalds/linux/commit/8fc134fee27f2263988ae38920bc03da416b03d8</a>
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.8<6.6 | |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP8 IF01 | |
Linux Linux kernel | >=3.8<4.14.326 | |
Linux Linux kernel | >=4.15<4.19.295 | |
Linux Linux kernel | >=4.20<5.4.257 | |
Linux Linux kernel | >=5.5<5.10.195 | |
Linux Linux kernel | >=5.11<5.15.132 | |
Linux Linux kernel | >=5.16<6.1.54 | |
Linux Linux kernel | >=6.2<6.5.4 | |
Debian Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4921 is a use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component that can be exploited to achieve local privilege escalation.
CVE-2023-4921 has a severity rating of 7.8 (high).
CVE-2023-4921 affects the Linux Kernel versions 3.8 to 6.6.
CVE-2023-4921 can be exploited by sending network packets when the plug qdisc is used as a class of the qfq qdisc, triggering a use-after-free vulnerability in qfq_dequeue().
Yes, you can find references for CVE-2023-4921 at the following links: [Link 1](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8) and [Link 2](https://kernel.dance/8fc134fee27f2263988ae38920bc03da416b03d8).