An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.
The qfqchangeagg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.
We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-3611.json"
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@3e337087c3b5805fe0b8a46ba622a962880b5d64",
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "110411059263500164730080321409251715596",
"length": 395.0
},
"id": "CVE-2023-3611-48b54639",
"signature_type": "Function",
"target": {
"file": "net/sched/sch_qfq.c",
"function": "qfq_change_agg"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@3e337087c3b5805fe0b8a46ba622a962880b5d64",
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"32836628806956125432490409937300860120",
"124249771071723007724307442780312932368",
"80238513525044335701635472020542676112",
"193980201474638104540390745659559642150"
],
"threshold": 0.9
},
"id": "CVE-2023-3611-f8907624",
"signature_type": "Line",
"target": {
"file": "net/sched/sch_qfq.c"
}
}
]