First published: Tue Mar 07 2023(Updated: )
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <5.14 | 5.14 |
Linux Linux kernel | <5.14 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.8 | |
Redhat Enterprise Linux For Power Little Endian | =8.0_ppc64le | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.8_ppc64le | |
Redhat Enterprise Linux Server Tus | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1476 is an incomplete fix for CVE-2022-41222, a use-after-free flaw in the Linux kernel's memory address space accounting code.
The severity of CVE-2023-1476 is high with a CVSS severity score of 7.
CVE-2023-1476 can allow a local user to crash the system or potentially escalate their privileges.
Linux kernel versions up to and excluding 5.14, Redhat Enterprise Linux 8.0, Redhat Enterprise Linux Eus 8.8, Redhat Enterprise Linux For Power Little Endian 8.0_ppc64le, Redhat Enterprise Linux For Power Little Endian Eus 8.8_ppc64le, and Redhat Enterprise Linux Server Tus 8.8 are affected by CVE-2023-1476.
To fix CVE-2023-1476, update your Linux kernel to version 5.14 or apply the necessary patches provided by Redhat.