First published: Mon Dec 25 2023(Updated: )
An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >2.6.12<6.6.8 | |
Linux Kernel | =2.6.12-rc2 | |
Linux Kernel | =2.6.12-rc3 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6.12-rc5 | |
Linux Kernel | =2.6.12-rc6 | |
Linux Kernel | =6.7-rc1 | |
Linux Kernel | =6.7-rc2 | |
Linux Kernel | =6.7-rc3 | |
Linux Kernel | =6.7-rc4 | |
Linux Kernel | =6.7-rc5 | |
Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Ensure that /etc/modprobe.d/blacklist-rare-network.conf contains the following lines: # appletalk alias net-pf-5 off
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51781 is classified as a high severity vulnerability due to its potential exploitation in the Linux kernel.
To fix CVE-2023-51781, update your Linux kernel to version 6.6.8 or later, or apply the specific patches provided by your distribution.
CVE-2023-51781 affects all Linux kernel versions prior to 6.6.8, including the 2.6.x series up to 6.7-rc5.
CVE-2023-51781 is a use-after-free vulnerability caused by a race condition in atalk_recvmsg within the Linux kernel.
Users and systems running vulnerable versions of the Linux kernel, particularly versions between 2.6.12 and 6.6.8, are susceptible to CVE-2023-51781.