A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.
When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfqdequeue() due to the incorrect .peek handler of schplug and lack of error checking in agg_dequeue().
We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.
[
{
"events": [
{
"introduced": "3.8"
},
{
"fixed": "4.14.326"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.295"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.257"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.195"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.132"
}
]
},
{
"events": [
{
"introduced": "5.16"
},
{
"fixed": "6.1.54"
}
]
},
{
"events": [
{
"introduced": "6.2"
},
{
"fixed": "6.5.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4921.json"