Executive Summary

Informations
Name CVE-2023-4622 First vendor Publication 2023-09-06
Vendor Cve Last vendor Modification 2025-02-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7
Base Score 7 Environmental Score 7
impact SubScore 5.9 Temporal Score 7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.

The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.

We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 2
Os 3569

Sources (Detail)

http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice...
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=li...
https://kernel.dance/790c2f9d15b594350ae9bca7b236f2b1859de02c
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://www.debian.org/security/2023/dsa-5492
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Date Informations
2025-03-29 03:27:28
  • Multiple Updates
2025-03-28 13:38:39
  • Multiple Updates
2025-03-28 03:07:56
  • Multiple Updates
2025-03-19 03:03:49
  • Multiple Updates
2025-03-18 03:16:14
  • Multiple Updates
2025-03-14 03:04:17
  • Multiple Updates
2025-02-21 21:21:09
  • Multiple Updates
2025-02-13 21:21:39
  • Multiple Updates
2025-01-08 02:57:20
  • Multiple Updates
2025-01-07 02:56:57
  • Multiple Updates
2024-12-25 02:55:42
  • Multiple Updates
2024-12-12 02:58:51
  • Multiple Updates
2024-11-28 14:30:34
  • Multiple Updates
2024-11-21 21:31:27
  • Multiple Updates
2024-11-20 02:53:03
  • Multiple Updates
2024-11-14 02:53:11
  • Multiple Updates
2024-11-09 02:53:29
  • Multiple Updates
2024-10-26 02:50:56
  • Multiple Updates
2024-10-25 02:52:49
  • Multiple Updates
2024-10-23 02:52:09
  • Multiple Updates
2024-10-03 02:47:50
  • Multiple Updates
2024-10-02 02:46:15
  • Multiple Updates
2024-09-12 02:43:48
  • Multiple Updates
2024-09-04 02:45:23
  • Multiple Updates
2024-08-22 02:43:31
  • Multiple Updates
2024-08-02 13:52:27
  • Multiple Updates
2024-08-02 01:34:12
  • Multiple Updates
2024-03-12 13:41:17
  • Multiple Updates
2024-02-02 02:49:21
  • Multiple Updates
2024-02-01 12:31:16
  • Multiple Updates
2024-01-12 00:27:53
  • Multiple Updates
2023-12-29 02:38:12
  • Multiple Updates
2023-11-29 21:27:44
  • Multiple Updates
2023-11-22 02:36:36
  • Multiple Updates
2023-10-29 09:27:46
  • Multiple Updates
2023-10-20 09:27:58
  • Multiple Updates
2023-10-11 02:31:58
  • Multiple Updates
2023-09-29 13:29:56
  • Multiple Updates
2023-09-12 00:27:40
  • Multiple Updates
2023-09-10 17:27:19
  • Multiple Updates
2023-09-07 09:27:17
  • Multiple Updates
2023-09-06 21:27:19
  • First insertion