Описание
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.
The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.
We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
A use-after-free flaw was found in the Linux kernel's af_unix component that allows local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. This issue leads to a race condition where the unix_stream_sendpage() function could access a skb that is being released by garbage collection, resulting in a use-after-free issue.
Меры по смягчению последствий
Mitigation for this issue is either not available or currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise Linux 9 | kernel-rt | Affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2024:2003 | 23.04.2024 |
Red Hat Enterprise Linux 7 | kpatch-patch | Fixed | RHSA-2024:1960 | 23.04.2024 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2024:2004 | 23.04.2024 |
Red Hat Enterprise Linux 7.7 Advanced Update Support | kernel | Fixed | RHSA-2024:5261 | 13.08.2024 |
Red Hat Enterprise Linux 8 | kernel-rt | Fixed | RHSA-2024:0134 | 10.01.2024 |
Red Hat Enterprise Linux 8 | kpatch-patch | Fixed | RHSA-2024:0089 | 09.01.2024 |
Red Hat Enterprise Linux 8 | kernel | Fixed | RHSA-2024:0113 | 10.01.2024 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | kernel | Fixed | RHSA-2024:0403 | 25.01.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.6 Medium
CVSS3
Связанные уязвимости
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
A use-after-free vulnerability in the Linux kernel's af_unix component ...
Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5)
EPSS
6.6 Medium
CVSS3