Lucene search

K
redhatcveRedhat.comRH:CVE-2023-31436
HistoryMay 02, 2023 - 6:22 p.m.

CVE-2023-31436

2023-05-0218:22:34
redhat.com
access.redhat.com
16
linux kernel; local privilege escalation; qos subsystem; out-of-bounds; memory access; sch_qfq; module blacklist

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

17.8%

An out-of-bounds memory access flaw was found in the Linux kernel’s traffic control (QoS) subsystem in how a user triggers the qfq_change_class function with an incorrect MTU value of the network device used as lmax. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Mitigation

To mitigate this issue, prevent the module, sch_qfq from being loaded. Please see <https://access.redhat.com/solutions/41278&gt; for information on how to blacklist a kernel module to prevent it from loading automatically.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

17.8%