CVE-2023-4611Use After Free in Kernel

CWE-416Use After Free8 documents8 sources
Severity
6.3MEDIUMNVD
EPSS
0.0%
top 94.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 29
Latest updateAug 15

Description

A use-after-free flaw was found in mm/mempolicy.c in the memory management subsystem in the Linux Kernel. This issue is caused by a race between mbind() and VMA-locked page fault, and may allow a local attacker to crash the system or lead to a kernel information leak.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.0 | Impact: 5.2

Affected Packages4 packages

NVDlinux/linux_kernel< 6.5+1
Debianlinux/linux_kernel< 6.4.11-1+1
debiandebian/linux< linux 6.4.11-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-95mw-86qw-9v54: A use-after-free flaw was found in mm/mempolicy2023-08-30
OSV
CVE-2023-4611: A use-after-free flaw was found in mm/mempolicy2023-08-29

📋Vendor Advisories

4
CISA ICS
Siemens SINEC NMS2024-08-15
Microsoft
Use after free race between mbind() and vma-locked page fault2023-08-08
Red Hat
kernel: Use after free race between mbind() and VMA-locked page fault2023-07-28
Debian
CVE-2023-4611: linux - A use-after-free flaw was found in mm/mempolicy.c in the memory management subsy...2023

💬Community

1
Bugzilla
CVE-2023-4611 kernel: Use after free race between mbind() and VMA-locked page fault2023-07-28
CVE-2023-4611 — Use After Free in Linux Kernel | cvebase