First published: Mon Jan 23 2023(Updated: )
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <6.2 | 6.2 |
Android | ||
Red Hat Kernel-devel | ||
Linux Kernel | >=4.14<4.14.303 | |
Linux Kernel | >=4.15<4.19.270 | |
Linux Kernel | >=4.20<5.4.229 | |
Linux Kernel | >=5.5<5.10.163 | |
Linux Kernel | >=5.11<5.15.88 | |
Linux Kernel | >=5.16<6.1.6 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0266 is classified as a high severity vulnerability due to its potential for privilege escalation.
To mitigate CVE-2023-0266, upgrade to Linux Kernel versions 6.2 or apply the appropriate patches provided in the latest updates.
CVE-2023-0266 affects multiple versions of the Linux Kernel, particularly those between 4.14 and 6.1.6.
CVE-2023-0266 is a use-after-free vulnerability that arises from missing locks in the ALSA PCM package.
Exploitation of CVE-2023-0266 could allow attackers to gain ring0 access, leading to complete control of the affected system.