Description
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23724 | A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system. |
References
History
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-27T20:34:44.630Z
Reserved: 2023-03-17T16:28:58.171Z
Link: CVE-2023-1476
Updated: 2024-08-02T05:49:11.660Z
Status : Modified
Published: 2023-11-03T09:15:13.393
Modified: 2024-11-21T07:39:16.030
Link: CVE-2023-1476
OpenCVE Enrichment
No data.
Weaknesses
EUVD