
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-0590 is a use-after-free vulnerability discovered in the qdiscgraft function in net/sched/schapi.c of the Linux Kernel. The vulnerability was identified due to a race condition problem and was disclosed on January 31, 2023. This flaw affects the Linux Kernel's network scheduler core implementation (Debian LTS, Ubuntu Security).
The vulnerability stems from a race condition in the qdiscgraft() function where a reference to qdisc is dropped in notifyanddestroy while it's still assigned to dev->qdisc. According to RCU (Read-Copy-Update) rules, the visible pointer (dev->qdisc) must be updated to the new object before the RCU grace period is started via qdiscput(old). The vulnerability has been assigned a CVSS 3 Severity Score of 4.7 (Medium) (Ubuntu Security, Kernel Patch).
The vulnerability can lead to a denial of service condition through system crashes or memory corruption. A local attacker with CAPNETADMIN capability in any user or network namespace could potentially exploit this flaw for privilege escalation (Ubuntu Security).
The vulnerability has been fixed through a patch (ebda44da44f6) titled 'net: sched: fix race condition in qdisc_graft()'. Multiple Linux distributions have released security updates to address this vulnerability, including Ubuntu and Debian. Users are advised to update their systems to the patched versions (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."