CVE-2023-4622

Updated: 2024-11-21 19:48:07.659552

Description:

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.0 HIGH Released CLSA-2024:1715000325 2024-05-06 14:33:10
AlmaLinux 9.2 FIPS kernel 5.14.0 7.0 HIGH Released CLSA-2024:1715000749 2024-05-06 14:32:08
CentOS 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-09-29 05:08:32
CentOS 7 ELS kernel 3.10.0 7.0 HIGH Already Fixed 2024-07-01 10:20:52
CentOS 8.4 ELS kernel 4.18.0 7.0 HIGH Released CLSA-2024:1722977546 2024-08-06 17:46:25
CentOS 8.5 ELS kernel 4.18.0 7.0 HIGH Released CLSA-2024:1722977984 2024-08-06 17:46:25
CloudLinux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-09-29 05:08:32
Oracle Linux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-09-29 05:08:31
Ubuntu 16.04 ELS linux 4.4.0 7.0 HIGH Released CLSA-2023:1695046627 2023-09-18 11:06:15
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.0 HIGH Released CLSA-2023:1695144235 2023-09-19 14:08:04
Total: 11