CVE-2023-1476

CWE-416Use After Free4 documents4 sources
Severity
7.0HIGH
EPSS
0.0%
top 95.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 3

Description

A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages1 packages

NVDlinux/linux_kernel< 5.14

Also affects: Enterprise Linux 8.0, 8.8

Patches

🔴Vulnerability Details

2
GHSA
GHSA-rccq-5462-rgcj: A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code2023-11-03
CVEList
Kpatch: mm/mremap.c: incomplete fix for cve-2022-412222023-11-03

📋Vendor Advisories

1
Red Hat
kpatch: mm/mremap.c: incomplete fix for CVE-2022-412222023-03-07