A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.
The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.
We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:rhel_aus:7.7 |
MITRE
Status: PUBLISHED
Assigner: Google
Published: 2023-09-06T13:56:56.355Z
Updated: 2024-08-02T07:31:06.586Z
Reserved: 2023-08-30T11:57:48.389Z
Link: CVE-2023-4622
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-09-06T14:15:12.193
Modified: 2024-11-21T08:35:33.420
Link: CVE-2023-4622
Redhat