CVE-2023-1476

Updated: 2025-08-20 00:34:45.512312

Description:

A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.0 HIGH Already Fixed 2024-04-18 10:09:33
CentOS 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-12-26 13:10:02
CentOS 7 ELS kernel 3.10.0 7.0 HIGH Not Vulnerable 2023-12-26 13:10:02
CentOS 8.4 ELS kernel 4.18.0 7.0 HIGH Not Vulnerable 2023-11-23 04:23:58
CentOS 8.5 ELS kernel 4.18.0 7.0 HIGH Released 2023-11-23 04:23:58
CloudLinux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2024-05-08 10:18:45
Oracle Linux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-12-26 13:10:02
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.0 HIGH Not Vulnerable 2023-11-27 08:38:52
Ubuntu 16.04 ELS linux 4.4.0 7.0 HIGH Not Vulnerable 2023-11-27 08:38:51
Ubuntu 18.04 ELS linux 4.15.0 7.0 HIGH Not Vulnerable 2023-11-27 08:38:51