CVE-2023-4622

Updated: 2025-08-20 00:01:11.242376

Description:

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.0 HIGH Released CLSA-2025:1743193221 2024-05-06 14:32:08
CentOS 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-09-29 05:08:32
CentOS 7 ELS kernel 3.10.0 7.0 HIGH Already Fixed 2024-07-01 10:20:52
CentOS 8.4 ELS kernel 4.18.0 7.0 HIGH Released CLSA-2024:1722977546 2024-08-06 17:46:25
CentOS 8.5 ELS kernel 4.18.0 7.0 HIGH Released CLSA-2024:1722977984 2024-08-06 17:46:25
CloudLinux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-09-29 05:08:32
Oracle Linux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-09-29 05:08:31
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.0 HIGH Released CLSA-2023:1695144235 2023-09-19 14:08:04
Ubuntu 16.04 ELS linux 4.4.0 7.0 HIGH Released CLSA-2023:1695046627 2023-09-18 11:06:15
Ubuntu 18.04 ELS linux 4.15.0 7.0 HIGH Released CLSA-2023:1695041084 2023-09-18 09:28:47