CVE-2013-7446

Severity

54%

Complexity

34%

Confidentiality

130%

CWE-416: Use After Free

Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.

CWE-416: Use After Free

CVSS 3.0 Base Score 5.3. CVSS Attack Vector: local. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVSS 2.0 Base Score 5.4. CVSS Attack Vector: local. CVSS Attack Complexity: medium. CVSS Vector: (AV:L/AC:M/Au:N/C:N/I:P/A:C).

Overview

First reported 9 years ago

2015-12-28 11:59:00

Last updated 6 years ago

2018-08-13 21:47:00

Affected Software

Linux Kernel

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c

SUSE-SU-2016:0745

SUSE-SU-2016:0746

SUSE-SU-2016:0747

SUSE-SU-2016:0749

SUSE-SU-2016:0750

SUSE-SU-2016:0751

SUSE-SU-2016:0752

SUSE-SU-2016:0753

SUSE-SU-2016:0754

SUSE-SU-2016:0755

SUSE-SU-2016:0756

SUSE-SU-2016:0757

SUSE-SU-2016:0911

SUSE-SU-2016:1102

openSUSE-SU-2016:1641

SUSE-SU-2016:1961

SUSE-SU-2016:1994

SUSE-SU-2016:1995

SUSE-SU-2016:2000

SUSE-SU-2016:2001

SUSE-SU-2016:2002

SUSE-SU-2016:2003

SUSE-SU-2016:2005

SUSE-SU-2016:2006

SUSE-SU-2016:2007

SUSE-SU-2016:2009

SUSE-SU-2016:2010

SUSE-SU-2016:2011

SUSE-SU-2016:2014

SUSE-SU-2016:2074

DSA-3426

http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3

Vendor Advisory

[oss-security] 20151118 Re: CVE request - Linux kernel - Unix sockets use after free - peer_wait_queue prematurely freed

77638

1034557

[netdev] 20150304 [PATCH net] af_unix: don't poll dead peers

Exploit

USN-2886-1

USN-2887-1

USN-2887-2

USN-2888-1

USN-2889-1

USN-2889-2

USN-2890-1

USN-2890-2

USN-2890-3

https://bugzilla.redhat.com/show_bug.cgi?id=1282688

https://forums.grsecurity.net/viewtopic.php?f=3&t=4150

https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c

Vendor Advisory

https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8

[linux-kernel] 20131014 Re: epoll oops.

Exploit

[linux-kernel] 20140515 eventpoll __list_del_entry corruption (was: perf: use after free in perf_remove_from_context)

Exploit

[linux-kernel] 20150913 List corruption on epoll_ctl(EPOLL_CTL_DEL) an AF_UNIX socket

Exploit

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.