Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-4622

Опубликовано: 06 сент. 2023
Источник: redhat
CVSS3: 6.6
EPSS Низкий

Описание

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.

A use-after-free flaw was found in the Linux kernel's af_unix component that allows local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. This issue leads to a race condition where the unix_stream_sendpage() function could access a skb that is being released by garbage collection, resulting in a use-after-free issue.

Меры по смягчению последствий

Mitigation for this issue is either not available or currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2024:200323.04.2024
Red Hat Enterprise Linux 7kpatch-patchFixedRHSA-2024:196023.04.2024
Red Hat Enterprise Linux 7kernelFixedRHSA-2024:200423.04.2024
Red Hat Enterprise Linux 7.7 Advanced Update SupportkernelFixedRHSA-2024:526113.08.2024
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2024:013410.01.2024
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2024:008909.01.2024
Red Hat Enterprise Linux 8kernelFixedRHSA-2024:011310.01.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportkernelFixedRHSA-2024:040325.01.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2237760kernel: use after free in unix_stream_sendpage

EPSS

Процентиль: 8%
0.00032
Низкий

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.

CVSS3: 7.8
nvd
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.

CVSS3: 7
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 7.8
debian
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's af_unix component ...

suse-cvrf
больше 1 года назад

Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5)

EPSS

Процентиль: 8%
0.00032
Низкий

6.6 Medium

CVSS3