An out-of-bounds write vulnerability in the Linux kernel’s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.
The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.
We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 10.0 | |
debian_linux | eq | 11.0 | |
debian_linux | eq | 12.0 | |
linux_kernel | eq | 6.5 rc1 | |
linux_kernel | ge | 3.8 | |
linux_kernel | lt | 6.5 |
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64
lists.debian.org/debian-lts-announce/2023/10/msg00027.html
lists.debian.org/debian-lts-announce/2024/01/msg00004.html
security.netapp.com/advisory/ntap-20230908-0002/
www.debian.org/security/2023/dsa-5480
www.debian.org/security/2023/dsa-5492