You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
we have detected that your project may be vulnerable to Use After Free in the function of nr_listen in the file of trunk/linux-3.4.x/net/netrom/af_netrom.c . It shares similarities to a recent CVE disclosure CVE-2023-32269 in the linux.
The source vulnerability information is as follows:
Vulnerability Detail:
CVE Identifier: CVE-2023-32269
Description: An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-32269
Patch: torvalds/linux@6117929
Would you help to check if this bug is true? If it's true, I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered:
Hi,
we have detected that your project may be vulnerable to Use After Free in the function of
nr_listen
in the file oftrunk/linux-3.4.x/net/netrom/af_netrom.c
. It shares similarities to a recent CVE disclosure CVE-2023-32269 in the linux.The source vulnerability information is as follows:
Would you help to check if this bug is true? If it's true, I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered: