Логотип exploitDog
bind:CVE-2023-53469
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-53469

Количество 5

Количество 5

ubuntu логотип

CVE-2023-53469

5 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2023-53469

5 месяцев назад

No description is available for this CVE.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2023-53469

5 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
msrc логотип

CVE-2023-53469

5 месяцев назад

af_unix: Fix null-ptr-deref in unix_stream_sendpage().

EPSS: Низкий
github логотип

GHSA-8r69-gc7h-5h9c

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix null-ptr-deref in unix_stream_sendpage(). Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage() with detailed analysis and a nice repro. unix_stream_sendpage() tries to add data to the last skb in the peer's recv queue without locking the queue. If the peer's FD is passed to another socket and the socket's FD is passed to the peer, there is a loop between them. If we close both sockets without receiving FD, the sockets will be cleaned up by garbage collection. The garbage collection iterates such sockets and unlinks skb with FD from the socket's receive queue under the queue's lock. So, there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. To avoid the issue, unix_stream_sendpage() must lock the peer's recv queue. Note the issue does not exist in 6.5+ thanks to the recent sendpage...

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-53469

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

5 месяцев назад
redhat логотип
CVE-2023-53469

No description is available for this CVE.

CVSS3: 4.7
5 месяцев назад
nvd логотип
CVE-2023-53469

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

5 месяцев назад
msrc логотип
CVE-2023-53469

af_unix: Fix null-ptr-deref in unix_stream_sendpage().

5 месяцев назад
github логотип
GHSA-8r69-gc7h-5h9c

In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix null-ptr-deref in unix_stream_sendpage(). Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage() with detailed analysis and a nice repro. unix_stream_sendpage() tries to add data to the last skb in the peer's recv queue without locking the queue. If the peer's FD is passed to another socket and the socket's FD is passed to the peer, there is a loop between them. If we close both sockets without receiving FD, the sockets will be cleaned up by garbage collection. The garbage collection iterates such sockets and unlinks skb with FD from the socket's receive queue under the queue's lock. So, there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. To avoid the issue, unix_stream_sendpage() must lock the peer's recv queue. Note the issue does not exist in 6.5+ thanks to the recent sendpage...

5 месяцев назад

Уязвимостей на страницу