A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:1659 | Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2023-1476 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2176035 | Issue Tracking |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2 | Mailing List Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2023-11-03T08:07:00.493Z
Updated: 2024-05-03T15:32:33.878Z
Reserved: 2023-03-17T16:28:58.171Z
Link: CVE-2023-1476
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-03T09:15:13.393
Modified: 2023-11-13T17:52:52.947
Link: CVE-2023-1476
JSON object: View
Redhat Information
No data.
CWE