When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().
We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3623-1 | linux-5.10 security update |
Debian DLA |
DLA-3710-1 | linux security update |
EUVD |
EUVD-2023-54757 | A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. |
Ubuntu USN |
USN-6439-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6439-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6440-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6440-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6440-3 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-6441-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6441-2 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6441-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6442-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6444-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6444-2 | Linux kernel (StarFive) vulnerabilities |
Ubuntu USN |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6446-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6446-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6446-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6454-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6454-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6454-3 | Linux kernel (ARM laptop) vulnerabilities |
Ubuntu USN |
USN-6454-4 | Linux kernel (StarFive) vulnerabilities |
Ubuntu USN |
USN-6461-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6479-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6699-1 | Linux kernel vulnerabilities |
Fri, 27 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. | A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. |
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2026-02-25T17:20:09.498Z
Reserved: 2023-09-12T19:22:10.389Z
Link: CVE-2023-4921
Updated: 2024-08-02T07:44:52.210Z
Status : Modified
Published: 2023-09-12T20:15:10.573
Modified: 2025-02-13T18:15:48.687
Link: CVE-2023-4921
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN