An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.
The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.
We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64. | An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64. |
Fri, 27 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux kernel
|
|
CPEs | cpe:2.3:o:linux:kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux kernel
|
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T16:56:15.625Z
Reserved: 2023-07-10T20:52:55.365Z
Link: CVE-2023-3611

Updated: 2024-08-02T07:01:57.288Z

Status : Modified
Published: 2023-07-21T21:15:11.897
Modified: 2025-02-13T17:16:58.047
Link: CVE-2023-3611
