Executive Summary

Informations
Name CVE-2023-0590 First vendor Publication 2023-03-23
Vendor Cve Last vendor Modification 2024-01-11

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 4.7
Base Score 4.7 Environmental Score 4.7
impact SubScore 3.6 Temporal Score 4.7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3497

Sources (Detail)

https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Date Informations
2024-03-12 13:32:23
  • Multiple Updates
2024-02-02 02:41:10
  • Multiple Updates
2024-02-01 12:28:41
  • Multiple Updates
2024-01-12 00:27:57
  • Multiple Updates
2023-12-29 02:30:51
  • Multiple Updates
2023-11-22 02:30:08
  • Multiple Updates
2023-11-07 21:29:37
  • Multiple Updates
2023-09-29 13:24:36
  • Multiple Updates
2023-09-05 13:37:05
  • Multiple Updates
2023-09-05 01:28:03
  • Multiple Updates
2023-09-02 13:34:16
  • Multiple Updates
2023-09-02 01:28:30
  • Multiple Updates
2023-08-12 13:40:55
  • Multiple Updates
2023-08-12 01:27:47
  • Multiple Updates
2023-08-11 13:31:50
  • Multiple Updates
2023-08-11 01:28:38
  • Multiple Updates
2023-08-06 13:29:20
  • Multiple Updates
2023-08-06 01:27:27
  • Multiple Updates
2023-08-04 13:29:46
  • Multiple Updates
2023-08-04 01:27:49
  • Multiple Updates
2023-07-14 13:29:42
  • Multiple Updates
2023-07-14 01:27:30
  • Multiple Updates
2023-06-06 13:18:58
  • Multiple Updates
2023-05-17 13:12:07
  • Multiple Updates
2023-04-13 02:16:16
  • Multiple Updates
2023-04-07 13:13:43
  • Multiple Updates
2023-03-30 09:27:19
  • Multiple Updates
2023-03-28 21:27:21
  • Multiple Updates
2023-03-24 09:27:12
  • Multiple Updates
2023-03-24 00:27:13
  • First insertion