Описание
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Issue Tracking
- Mailing ListPatch
- Third Party Advisory
- Third Party Advisory
- Issue Tracking
- Mailing ListPatch
Уязвимые конфигурации
Одно из
EPSS
7 High
CVSS3
Дефекты
Связанные уязвимости
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
Уязвимость функции mremap() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
EPSS
7 High
CVSS3