Executive Summary

Informations
Name CVE-2023-1476 First vendor Publication 2023-11-03
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7
Base Score 7 Environmental Score 7
impact SubScore 5.9 Temporal Score 7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1476

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6
Os 3469
Os 1
Os 1
Os 1
Os 1
Os 1

Sources (Detail)

https://access.redhat.com/errata/RHSA-2023:1659
https://access.redhat.com/security/cve/CVE-2023-1476
https://bugzilla.redhat.com/show_bug.cgi?id=2176035
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Date Informations
2025-03-29 03:16:06
  • Multiple Updates
2025-03-28 13:35:44
  • Multiple Updates
2025-03-28 02:58:25
  • Multiple Updates
2025-03-18 03:06:25
  • Multiple Updates
2025-03-14 02:55:05
  • Multiple Updates
2025-01-08 02:48:39
  • Multiple Updates
2025-01-07 02:48:15
  • Multiple Updates
2024-12-25 02:47:01
  • Multiple Updates
2024-12-12 02:49:57
  • Multiple Updates
2024-11-28 14:19:53
  • Multiple Updates
2024-11-21 21:29:07
  • Multiple Updates
2024-11-14 02:44:32
  • Multiple Updates
2024-11-09 02:45:09
  • Multiple Updates
2024-10-26 02:42:47
  • Multiple Updates
2024-10-25 02:44:34
  • Multiple Updates
2024-10-23 02:43:54
  • Multiple Updates
2024-10-03 02:39:56
  • Multiple Updates
2024-10-02 02:38:19
  • Multiple Updates
2024-09-04 02:37:36
  • Multiple Updates
2024-08-22 02:35:52
  • Multiple Updates
2024-08-02 13:44:12
  • Multiple Updates
2024-08-02 01:31:43
  • Multiple Updates
2024-03-12 13:32:58
  • Multiple Updates
2024-02-02 02:41:41
  • Multiple Updates
2024-02-01 12:28:50
  • Multiple Updates
2024-01-12 02:33:46
  • Multiple Updates
2023-12-29 02:31:20
  • Multiple Updates
2023-11-22 02:30:37
  • Multiple Updates
2023-11-13 21:27:32
  • Multiple Updates
2023-11-07 21:27:13
  • Multiple Updates
2023-11-03 17:27:26
  • Multiple Updates
2023-11-03 13:27:22
  • First insertion