panasalap / linux-4.19.72_wext-sme

Other
0 stars 0 forks source link

CVE-2023-4622 (High) detected in linux-yoctov5.4.51 #493

Open mend-bolt-for-github[bot] opened 7 months ago

mend-bolt-for-github[bot] commented 7 months ago

CVE-2023-4622 - High Severity Vulnerability

Vulnerable Library - linux-yoctov5.4.51

Yocto Linux Embedded kernel

Library home page: https://git.yoctoproject.org/git/linux-yocto

Found in base branch: master

Vulnerable Source Files (2)

/net/unix/af_unix.c /net/unix/af_unix.c

Vulnerability Details

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.

Publish Date: 2023-09-06

URL: CVE-2023-4622

CVSS 3 Score Details (7.0)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.linuxkernelcves.com/cves/CVE-2023-4622

Release Date: 2023-09-06

Fix Resolution: v6.5-rc1


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 4 months ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.