First published: Tue Nov 17 2015(Updated: )
A flaw was found in the Linux kernels implementation of Unix sockets. A server polling for data coming from a client socket may put the peer socket on a wait list. This peer may close the connection making the reference on the wait list no longer valid. This could lead to bypssing the permissions on a unix socket, and packets being injected into the stream. This may also panic the machine. Additional resources: <a href="https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8">https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8</a> <a href="http://seclists.org/oss-sec/2015/q4/321">http://seclists.org/oss-sec/2015/q4/321</a> <a href="https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c">https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.3.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7446 is a use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3.
CVE-2013-7446 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
CVE-2013-7446 has a severity level of medium.
The Linux kernel versions before 4.3.3 are affected by CVE-2013-7446.
To fix CVE-2013-7446, you need to update your Linux kernel to version 4.3.3 or later.