Vulnerability Description
A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.1 |
Related Weaknesses (CWE)
References
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
FAQ
What is CVE-2023-0590?
CVE-2023-0590 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix r...
How severe is CVE-2023-0590?
CVE-2023-0590 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0590?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.