CVE-2023-4921

Summary

CVECVE-2023-4921
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-09-12 20:15:00 UTC
Updated2023-10-29 02:39:00 UTC
DescriptionA use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.

Risk And Classification

Problem Types: CWE-416

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 10.0 All All All
Operating System Linux Linux Kernel All All All All

References

ReferenceSourceLinkTags
[SECURITY] [DLA 3623-1] linux-5.10 security update MISC lists.debian.org
kernel.dance/8fc134fee27f2263988ae38920bc03da416b03d8 MISC kernel.dance
kernel/git/torvalds/linux.git - Linux kernel source tree MISC git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 161237 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-13043)
  • 161334 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2024-12110)
  • 161372 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-12169)
  • 161402 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-0897)
  • 161426 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-1249)
  • 199841 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6444-1)
  • 199842 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6440-1)
  • 199843 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6439-1)
  • 199844 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6445-1)
  • 199845 Ubuntu Security Notification for Linux kernel (BlueField) Vulnerabilities (USN-6442-1)
  • 199846 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6441-1)
  • 199848 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6446-1)
  • 199849 Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-6440-2)
  • 199854 Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-6441-2)
  • 199855 Ubuntu Security Notification for Linux kernel (AWS) Vulnerabilities (USN-6439-2)
  • 199858 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6445-2)
  • 199859 Ubuntu Security Notification for Linux kernel (StarFive) Vulnerabilities (USN-6444-2)
  • 199861 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6446-2)
  • 199864 Ubuntu Security Notification for Linux kernel (HWE) Vulnerabilities (USN-6440-3)
  • 199868 Ubuntu Security Notification for Linux kernel (Oracle) Vulnerabilities (USN-6446-3)
  • 199872 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6441-3)
  • 199881 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6461-1)
  • 199883 Ubuntu Security Notification for Linux kernel (NVIDIA) Vulnerabilities (USN-6466-1)
  • 199893 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6479-1)
  • 199912 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6454-1)
  • 199913 Ubuntu Security Notification for Linux kernel (StarFive) Vulnerabilities (USN-6454-4)
  • 199916 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6454-2)
  • 199918 Ubuntu Security Notification for Linux kernel (ARM laptop) Vulnerabilities (USN-6454-3)
  • 200201 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6699-1)
  • 242785 Red Hat Update for kpatch-patch (RHSA-2024:0593)
  • 242830 Red Hat Update for kernel-rt (RHSA-2024:0563)
  • 242831 Red Hat Update for kernel (RHSA-2024:0562)
  • 242890 Red Hat Update for kernel (RHSA-2024:0724)
  • 242931 Red Hat Update for kpatch-patch (RHSA-2024:0851)
  • 242938 Red Hat Update for kpatch-patch (RHSA-2024:0876)
  • 242939 Red Hat Update for kernel (RHSA-2024:0897)
  • 242983 Red Hat Update for kernel-rt (RHSA-2024:0881)
  • 243051 Red Hat Update for kernel (RHSA-2024:1249)
  • 243055 Red Hat Update for kernel (RHSA-2024:1268)
  • 243057 Red Hat Update for kpatch-patch (RHSA-2024:1278)
  • 243058 Red Hat Update for kernel-rt (RHSA-2024:1269)
  • 243068 Red Hat Update for kpatch-patch (RHSA-2024:1323)
  • 243071 Red Hat Update for kernel-rt (RHSA-2024:1332)
  • 243078 Red Hat Update for kpatch-patch (RHSA-2024:1368)
  • 243087 Red Hat Update for kernel (RHSA-2024:1404)
  • 257311 CentOS Security Update for kernel (CESA-2024:1249)
  • 356357 Amazon Linux Security Advisory for kernel : ALAS-2023-1838
  • 356371 Amazon Linux Security Advisory for kernel : ALAS2023-2023-356
  • 356409 Amazon Linux Security Advisory for kernel : ALAS2-2023-2264
  • 356567 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2023-027
  • 356571 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-155
  • 356572 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2023-040
  • 356577 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-150
  • 356584 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-152
  • 356588 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-154
  • 356595 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-153
  • 356599 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-151
  • 356606 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2023-053
  • 356611 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-149
  • 356919 Amazon Linux Security Advisory for kernel-livepatch : ALAS2023LIVEPATCH-2023-026
  • 356923 Amazon Linux Security Advisory for kernel-livepatch : ALAS2023LIVEPATCH-2023-024
  • 356924 Amazon Linux Security Advisory for kernel-livepatch : ALAS2023LIVEPATCH-2023-025
  • 379043 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0136)
  • 379435 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2024:0012)
  • 390294 Oracle Managed Virtualization (VM) Server for x86 Security Update for kernel (OVMSA-2024-0002)
  • 6000265 Debian Security Update for linux-5.10 (DLA 3623-1)
  • 6000429 Debian Security Update for linux (DLA 3710-1)
  • 6140163 AWS Bottlerocket Security Update for kernel (GHSA-prvh-4x5m-5x39)
  • 673406 EulerOS Security Update for kernel (EulerOS-SA-2023-3182)
  • 673563 EulerOS Security Update for kernel (EulerOS-SA-2024-1144)
  • 673595 EulerOS Security Update for kernel (EulerOS-SA-2023-3247)
  • 673644 EulerOS Security Update for kernel (EulerOS-SA-2023-3336)
  • 673692 EulerOS Security Update for kernel (EulerOS-SA-2023-3275)
  • 673848 EulerOS Security Update for kernel (EulerOS-SA-2023-3217)
  • 673995 EulerOS Security Update for kernel (EulerOS-SA-2024-1275)
  • 674042 EulerOS Security Update for kernel (EulerOS-SA-2023-3304)
  • 755059 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4035-1)
  • 755060 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4031-1)
  • 755061 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4030-1)
  • 755063 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4032-1)
  • 755082 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4058-1)
  • 755083 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4057-1)
  • 755085 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4072-1)
  • 755086 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4071-1)
  • 755096 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4093-1)
  • 755107 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4095-1)
  • 755229 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4072-2)
  • 755565 SUSE Security Update for the linux kernel (SUSE-SU-2023:4347-1)
  • 755747 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2024:0469-1)
  • 755751 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2024:0474-1)
  • 755752 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2024:0478-1)
  • 755754 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2024:0516-1)
  • 755755 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2024:0515-1)
  • 755756 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2024:0514-1)
  • 755837 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) (SUSE-SU-2024:0624-1)
  • 755838 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) (SUSE-SU-2024:0622-1)
  • 755860 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) (SUSE-SU-2024:0655-1)
  • 755865 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 33 for SLE 15 SP2) (SUSE-SU-2024:0666-1)
  • 755868 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) (SUSE-SU-2024:0685-1)
  • 755869 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) (SUSE-SU-2024:0698-1)
  • 755871 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) (SUSE-SU-2024:0727-1)
  • 907387 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (28779-1)
  • 941584 AlmaLinux Security Update for kernel (ALSA-2024:0897)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report