First published: Mon Dec 25 2023(Updated: )
An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.6.8 | 6.6.8 |
Linux Kernel | >2.6.12<6.6.8 | |
Linux Kernel | =2.6.12-rc2 | |
Linux Kernel | =2.6.12-rc3 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6.12-rc5 | |
Linux Kernel | =2.6.12-rc6 | |
Linux Kernel | =6.7-rc1 | |
Linux Kernel | =6.7-rc2 | |
Linux Kernel | =6.7-rc3 | |
Linux Kernel | =6.7-rc4 | |
Linux Kernel | =6.7-rc5 | |
Debian Linux | =10.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51780 carries a high severity rating due to the presence of a use-after-free vulnerability in the Linux kernel.
To mitigate CVE-2023-51780, update the Linux kernel to version 6.6.8 or later.
CVE-2023-51780 affects Linux kernel versions before 6.6.8, including versions 2.6.12 through 6.6.7.
In CVE-2023-51780, the use-after-free vulnerability allows an attacker to exploit a race condition that may lead to arbitrary code execution.
CVE-2023-51780 impacts multiple distributions, including Red Hat and Debian, that utilize vulnerable versions of the Linux kernel.