CVE-2023-4623

Summary

CVECVE-2023-4623
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-09-06 14:15:00 UTC
Updated2023-10-29 02:40:00 UTC
DescriptionA use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.

Risk And Classification

Problem Types: CWE-416

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 10.0 All All All
Operating System Linux Linux Kernel All All All All
Operating System Linux Linux Kernel 2.6.12 rc1 All All
Operating System Linux Linux Kernel All All All All

References

ReferenceSourceLinkTags
[SECURITY] [DLA 3623-1] linux-5.10 security update MISC lists.debian.org
kernel/git/torvalds/linux.git - Linux kernel source tree MISC git.kernel.org
kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f MISC kernel.dance
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 161220 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-13039)
  • 161237 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-13043)
  • 161339 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-12149)
  • 161390 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-12187)
  • 161402 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-0897)
  • 161404 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-0461)
  • 199803 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6415-1)
  • 199841 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6444-1)
  • 199842 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6440-1)
  • 199843 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6439-1)
  • 199844 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6445-1)
  • 199845 Ubuntu Security Notification for Linux kernel (BlueField) Vulnerabilities (USN-6442-1)
  • 199846 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6441-1)
  • 199848 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6446-1)
  • 199849 Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-6440-2)
  • 199854 Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-6441-2)
  • 199855 Ubuntu Security Notification for Linux kernel (AWS) Vulnerabilities (USN-6439-2)
  • 199858 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6445-2)
  • 199859 Ubuntu Security Notification for Linux kernel (StarFive) Vulnerabilities (USN-6444-2)
  • 199861 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6446-2)
  • 199864 Ubuntu Security Notification for Linux kernel (HWE) Vulnerabilities (USN-6440-3)
  • 199868 Ubuntu Security Notification for Linux kernel (Oracle) Vulnerabilities (USN-6446-3)
  • 199872 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6441-3)
  • 199874 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6460-1)
  • 199883 Ubuntu Security Notification for Linux kernel (NVIDIA) Vulnerabilities (USN-6466-1)
  • 242727 Red Hat Update for kpatch-patch (RHSA-2024:0340)
  • 242728 Red Hat Update for kpatch-patch (RHSA-2024:0378)
  • 242734 Red Hat Update for kpatch-patch (RHSA-2024:0381)
  • 242738 Red Hat Update for kpatch-patch (RHSA-2024:0386)
  • 242759 Red Hat Update for kernel (RHSA-2024:0432)
  • 242769 Red Hat Update for kpatch-patch (RHSA-2024:0554)
  • 242785 Red Hat Update for kpatch-patch (RHSA-2024:0593)
  • 242789 Red Hat Update for kernel (RHSA-2024:0575)
  • 242830 Red Hat Update for kernel-rt (RHSA-2024:0563)
  • 242831 Red Hat Update for kernel (RHSA-2024:0562)
  • 242839 Red Hat Update for kernel (RHSA-2024:0461)
  • 242845 Red Hat Update for kernel (RHSA-2024:0448)
  • 242846 Red Hat Update for kernel-rt (RHSA-2024:0439)
  • 242847 Red Hat Update for kernel-rt (RHSA-2024:0431)
  • 242855 Red Hat Update for kernel (RHSA-2024:0412)
  • 242938 Red Hat Update for kpatch-patch (RHSA-2024:0876)
  • 242939 Red Hat Update for kernel (RHSA-2024:0897)
  • 242983 Red Hat Update for kernel-rt (RHSA-2024:0881)
  • 243055 Red Hat Update for kernel (RHSA-2024:1268)
  • 243057 Red Hat Update for kpatch-patch (RHSA-2024:1278)
  • 243058 Red Hat Update for kernel-rt (RHSA-2024:1269)
  • 356357 Amazon Linux Security Advisory for kernel : ALAS-2023-1838
  • 356371 Amazon Linux Security Advisory for kernel : ALAS2023-2023-356
  • 356409 Amazon Linux Security Advisory for kernel : ALAS2-2023-2264
  • 356567 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2023-027
  • 356571 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-155
  • 356572 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2023-040
  • 356577 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-150
  • 356584 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-152
  • 356588 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-154
  • 356595 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-153
  • 356599 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-151
  • 356606 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2023-053
  • 356611 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-149
  • 356919 Amazon Linux Security Advisory for kernel-livepatch : ALAS2023LIVEPATCH-2023-026
  • 356923 Amazon Linux Security Advisory for kernel-livepatch : ALAS2023LIVEPATCH-2023-024
  • 356924 Amazon Linux Security Advisory for kernel-livepatch : ALAS2023LIVEPATCH-2023-025
  • 379043 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0136)
  • 379435 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2024:0012)
  • 6000265 Debian Security Update for linux-5.10 (DLA 3623-1)
  • 6000429 Debian Security Update for linux (DLA 3710-1)
  • 6140413 AWS Bottlerocket Security Update for kernel (GHSA-5956-78jx-7225)
  • 673406 EulerOS Security Update for kernel (EulerOS-SA-2023-3182)
  • 673563 EulerOS Security Update for kernel (EulerOS-SA-2024-1144)
  • 673595 EulerOS Security Update for kernel (EulerOS-SA-2023-3247)
  • 673644 EulerOS Security Update for kernel (EulerOS-SA-2023-3336)
  • 673692 EulerOS Security Update for kernel (EulerOS-SA-2023-3275)
  • 673848 EulerOS Security Update for kernel (EulerOS-SA-2023-3217)
  • 673995 EulerOS Security Update for kernel (EulerOS-SA-2024-1275)
  • 674042 EulerOS Security Update for kernel (EulerOS-SA-2023-3304)
  • 755059 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4035-1)
  • 755060 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4031-1)
  • 755061 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4030-1)
  • 755063 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4032-1)
  • 755082 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4058-1)
  • 755083 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4057-1)
  • 755085 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4072-1)
  • 755086 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4071-1)
  • 755096 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4093-1)
  • 755107 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4095-1)
  • 755135 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP4) (SUSE-SU-2023:4166-1)
  • 755136 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP4) (SUSE-SU-2023:4165-1)
  • 755137 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP4) (SUSE-SU-2023:4164-1)
  • 755140 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) (SUSE-SU-2023:4175-1)
  • 755148 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 18 for SLE 15 SP4) (SUSE-SU-2023:4328-1)
  • 755154 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP4) (SUSE-SU-2023:4201-1)
  • 755168 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 33 for SLE 15 SP3) (SUSE-SU-2023:4219-1)
  • 755178 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 36 for SLE 15 SP3) (SUSE-SU-2023:4261-1)
  • 755179 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 35 for SLE 15 SP3) (SUSE-SU-2023:4260-1)
  • 755180 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 33 for SLE 15 SP2) (SUSE-SU-2023:4245-1)
  • 755181 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 35 for SLE 15 SP1) (SUSE-SU-2023:4244-1)
  • 755182 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 40 for SLE 15 SP2) (SUSE-SU-2023:4243-1)
  • 755184 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 29 for SLE 15 SP3) (SUSE-SU-2023:4239-1)
  • 755186 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 4 for SLE 15 SP4) (SUSE-SU-2023:4267-1)
  • 755192 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 7 for SLE 15 SP4) (SUSE-SU-2023:4285-1)
  • 755193 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 44 for SLE 15 SP1) (SUSE-SU-2023:4280-1)
  • 755194 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 34 for SLE 15 SP2) (SUSE-SU-2023:4279-1)
  • 755195 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 37 for SLE 15 SP1) (SUSE-SU-2023:4278-1)
  • 755196 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 16 for SLE 15 SP4) (SUSE-SU-2023:4301-1)
  • 755197 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 39 for SLE 12 SP5) (SUSE-SU-2023:4300-1)
  • 755210 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) (SUSE-SU-2023:4308-1)
  • 755212 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) (SUSE-SU-2023:4326-1)
  • 755213 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 3 for SLE 15 SP5) (SUSE-SU-2023:4325-1)
  • 755214 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 15 for SLE 15 SP4) (SUSE-SU-2023:4322-1)
  • 755215 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 37 for SLE 12 SP5) (SUSE-SU-2023:4321-1)
  • 755229 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4072-2)
  • 755565 SUSE Security Update for the linux kernel (SUSE-SU-2023:4347-1)
  • 907559 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (31697-1)
  • 941584 AlmaLinux Security Update for kernel (ALSA-2024:0897)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report