SB2024053103 - Use-after-free in Linux kernel unix
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-52772)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the unix_stream_recv_urg() function in net/unix/af_unix.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/75bcfc188abf4fae9c1d5f5dc0a03540be602eef
- https://git.kernel.org/stable/c/d179189eec426fe4801e4b91efa1889faed12700
- https://git.kernel.org/stable/c/eae0b295ce16d8c8b4114c3037993191b4bb92f0
- https://git.kernel.org/stable/c/069a3ec329ff43e7869a3d94c62cd03203016bce
- https://git.kernel.org/stable/c/4b7b492615cf3017190f55444f7016812b66611d
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.140
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.64
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7