CVE-2023-4622

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-4622
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-4622.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-4622
Aliases
Downstream
Related
Published
2023-09-06T14:15:12Z
Modified
2025-08-09T20:01:27Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.

The unixstreamsendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unixstreamsendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.

We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.

References

Affected packages