A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
History

Tue, 13 Aug 2024 22:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:rhel_aus:7.7

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published: 2023-09-06T13:56:56.355Z

Updated: 2024-08-02T07:31:06.586Z

Reserved: 2023-08-30T11:57:48.389Z

Link: CVE-2023-4622

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-09-06T14:15:12.193

Modified: 2024-01-11T19:15:12.097

Link: CVE-2023-4622

cve-icon Redhat

Severity : Important

Publid Date: 2023-09-06T00:00:00Z

Links: CVE-2023-4622 - Bugzilla