Updated: 2023-09-12 03:58:37.58082
Description:
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | 0 | |
CVSS Version 3.x | HIGH | 7 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated |
---|---|---|---|---|---|---|---|
CentOS 6 ELS | kernel | 2.6.32 | 7 | HIGH | Needs Triage | 2023-09-12 00:19:10 | |
CentOS 7 ELS | kernel | 3.10.0 | 7 | HIGH | Needs Triage | 2023-09-18 17:14:40 | |
CentOS 8.4 ELS | kernel | 4.18.0 | 7 | HIGH | Needs Triage | 2023-09-12 00:19:13 | |
CentOS 8.5 ELS | kernel | 4.18.0 | 7 | HIGH | Needs Triage | 2023-09-12 00:19:12 | |
CloudLinux 6 ELS | kernel | 2.6.32 | 7 | HIGH | Needs Triage | 2023-09-12 00:19:09 | |
Oracle Linux 6 ELS | kernel | 2.6.32 | 7 | HIGH | Needs Triage | 2023-09-12 00:19:11 | |
Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7 | HIGH | Released | CLSA-2023:1695144235 | 2023-09-19 14:08:04 |
Ubuntu 16.04 ELS | linux | 4.4.0 | 7 | HIGH | Released | CLSA-2023:1695046627 | 2023-09-18 11:06:15 |
Ubuntu 18.04 ELS | linux | 4.15.0 | 7 | HIGH | Released | CLSA-2023:1695041084 | 2023-09-18 09:28:47 |