{"id":"CVE-2023-4623","details":"A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.","modified":"2026-03-13T07:41:18.774315Z","published":"2023-09-06T14:15:12.357Z","related":["ALSA-2024:0897","SUSE-SU-2023:4028-1","SUSE-SU-2023:4030-1","SUSE-SU-2023:4031-1","SUSE-SU-2023:4032-1","SUSE-SU-2023:4033-1","SUSE-SU-2023:4035-1","SUSE-SU-2023:4057-1","SUSE-SU-2023:4058-1","SUSE-SU-2023:4071-1","SUSE-SU-2023:4072-1","SUSE-SU-2023:4072-2","SUSE-SU-2023:4093-1","SUSE-SU-2023:4095-1","SUSE-SU-2023:4142-1","SUSE-SU-2023:4164-1","SUSE-SU-2023:4165-1","SUSE-SU-2023:4166-1","SUSE-SU-2023:4175-1","SUSE-SU-2023:4201-1","SUSE-SU-2023:4204-1","SUSE-SU-2023:4208-1","SUSE-SU-2023:4219-1","SUSE-SU-2023:4239-1","SUSE-SU-2023:4243-1","SUSE-SU-2023:4244-1","SUSE-SU-2023:4245-1","SUSE-SU-2023:4260-1","SUSE-SU-2023:4261-1","SUSE-SU-2023:4267-1","SUSE-SU-2023:4273-1","SUSE-SU-2023:4278-1","SUSE-SU-2023:4279-1","SUSE-SU-2023:4280-1","SUSE-SU-2023:4285-1","SUSE-SU-2023:4300-1","SUSE-SU-2023:4301-1","SUSE-SU-2023:4308-1","SUSE-SU-2023:4313-1","SUSE-SU-2023:4321-1","SUSE-SU-2023:4322-1","SUSE-SU-2023:4325-1","SUSE-SU-2023:4326-1","SUSE-SU-2023:4328-1","SUSE-SU-2023:4347-1","openSUSE-SU-2024:13305-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f"},{"type":"FIX","url":"https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-4623.json","unresolved_ranges":[{"events":[{"introduced":"2.6.12"},{"fixed":"4.14.327"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.295"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.257"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.195"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.132"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.1.53"}]},{"events":[{"introduced":"6.2"},{"fixed":"6.4.16"}]},{"events":[{"introduced":"6.5"},{"fixed":"6.5.3"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}