CVE-2023-4623

Source
https://cve.org/CVERecord?id=CVE-2023-4623
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-4623.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-4623
Downstream
Related
Published
2023-09-06T13:56:57.295Z
Modified
2026-05-15T11:54:43.336360539Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Use-after-free in Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component
Details

A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.

If a class with a link-sharing curve (i.e. with the HFSCFSC flag set) has a parent without a link-sharing curve, then initvf() will call vttreeinsert() on the parent, but vttreeremove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.

We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/4xxx/CVE-2023-4623.json",
    "cna_assigner": "Google",
    "cwe_ids": [
        "CWE-416"
    ]
}
References

Affected packages