An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64 | patch vendor advisory mailing list |
https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64 | patch vendor advisory |
https://www.debian.org/security/2023/dsa-5480 | third party advisory |
https://security.netapp.com/advisory/ntap-20230908-0002/ | third party advisory |
https://www.debian.org/security/2023/dsa-5492 | third party advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | mailing list |