CVE-2023-4921

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's qfq scheduler component that allows local attackers to escalate privileges. The vulnerability occurs when the plug qdisc is configured as a class of the qfq qdisc, triggering memory corruption during packet processing. Systems running vulnerable Linux kernel versions with specific qdisc configurations are affected.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Kernel versions before commit 8fc134fee27f2263988ae38920bc03da416b03d8
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires specific configuration: plug qdisc must be used as a class of qfq qdisc. Not all systems use this configuration.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains root privileges, leading to complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Local user escalates to root privileges, enabling unauthorized access to sensitive data and system resources.

🟢

If Mitigated

Attack fails due to proper kernel hardening, SELinux/apparmor policies, or lack of required qdisc configuration.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any user with shell access can potentially exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and specific qdisc configuration. Exploit development requires kernel expertise.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel with commit 8fc134fee27f2263988ae38920bc03da416b03d8

Vendor Advisory: https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html

Restart Required: Yes

Instructions:

1. Update kernel package using distribution's package manager. 2. For Debian/Ubuntu: apt update && apt upgrade linux-image-*. 3. For RHEL/CentOS: yum update kernel. 4. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable qfq qdisc configuration

linux

Remove or reconfigure network interfaces to not use qfq qdisc with plug qdisc as class

tc qdisc del dev eth0 root
tc qdisc add dev eth0 root fq_codel

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts
  • Use kernel hardening features like SELinux/apparmor with strict policies

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if commit 8fc134fee27f is present: uname -r && git log --oneline | grep 8fc134fee27f

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix: uname -r and check with distribution's security advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes
  • Unexpected privilege escalation in audit logs

Network Indicators:

  • Unusual network configuration changes

SIEM Query:

source="kernel" AND ("qfq" OR "use-after-free" OR "general protection fault")

🔗 References

📤 Share & Export