cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
References
Configurations
History
21 Nov 2024, 07:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12 - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html - | |
References | () https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html - | |
References | () https://www.debian.org/security/2023/dsa-5324 - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2023/01/10/1 - Mailing List, Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2023/01/10/4 - Mailing List, Third Party Advisory | |
Summary |
|
Information
Published : 2023-01-12 07:15
Updated : 2024-11-21 07:46
NVD link : CVE-2023-23454
Mitre link : CVE-2023-23454
CVE.ORG link : CVE-2023-23454
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')