CVE-2023-1476

Updated: 2023-11-14 22:18:15.369441

Description:

A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU kernel 5.14.0 7 HIGH Already Fixed 2024-04-14 11:13:38
AlmaLinux 9.2 FIPS kernel 5.14.0 7 HIGH Already Fixed 2024-04-18 10:09:33
CentOS 6 ELS kernel 2.6.32 7 HIGH Not Vulnerable 2023-12-26 13:10:02
CentOS 7 ELS kernel 3.10.0 7 HIGH Not Vulnerable 2023-12-26 13:10:02
CentOS 8.4 ELS kernel 4.18.0 7 HIGH Not Vulnerable 2023-11-23 04:23:58
CentOS 8.5 ELS kernel 4.18.0 7 HIGH Released 2023-11-23 04:23:58
CloudLinux 6 ELS kernel 2.6.32 7 HIGH Not Vulnerable 2024-05-08 10:18:45
Oracle Linux 6 ELS kernel 2.6.32 7 HIGH Not Vulnerable 2023-12-26 13:10:02
Ubuntu 16.04 ELS linux-hwe 4.15.0 7 HIGH Not Vulnerable 2023-11-27 08:38:52
Ubuntu 16.04 ELS linux 4.4.0 7 HIGH Not Vulnerable 2023-11-27 08:38:51
Total: 11