CVE-2023-31436

qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.
References
Link Resource
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13 Mailing List Patch
https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d Patch
https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230609-0001/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5402 VDB Entry
https://www.spinics.net/lists/stable-commits/msg294885.html Mailing List Patch
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13 Mailing List Patch
https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d Patch
https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230609-0001/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5402 VDB Entry
https://www.spinics.net/lists/stable-commits/msg294885.html Mailing List Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:01

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html - () http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -
References () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13 - Mailing List, Patch () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13 - Mailing List, Patch
References () https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d - Patch () https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d - Patch
References () https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230609-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230609-0001/ - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5402 - VDB Entry () https://www.debian.org/security/2023/dsa-5402 - VDB Entry
References () https://www.spinics.net/lists/stable-commits/msg294885.html - Mailing List, Patch () https://www.spinics.net/lists/stable-commits/msg294885.html - Mailing List, Patch

29 Nov 2023, 15:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html -

18 Aug 2023, 18:39

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html - (MISC) http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html - Third Party Advisory, VDB Entry
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0001/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0001/ - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - (MISC) http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - Third Party Advisory, VDB Entry
References (MLIST) https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - (MLIST) https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2023/dsa-5402 - (DEBIAN) https://www.debian.org/security/2023/dsa-5402 - VDB Entry

26 Jul 2023, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html -

22 Jun 2023, 15:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html -

09 Jun 2023, 08:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230609-0001/ -

05 Jun 2023, 21:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html -

Information

Published : 2023-04-28 02:15

Updated : 2024-11-21 08:01


NVD link : CVE-2023-31436

Mitre link : CVE-2023-31436

CVE.ORG link : CVE-2023-31436


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write