Описание
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Not affected | ||
Red Hat Enterprise Linux 9 | kernel | Not affected | ||
Red Hat Enterprise Linux 9 | kernel-rt | Not affected | ||
Red Hat Enterprise Linux 8 | kernel-rt | Fixed | RHSA-2023:0854 | 21.02.2023 |
Red Hat Enterprise Linux 8 | kernel | Fixed | RHSA-2023:0832 | 21.02.2023 |
Red Hat Enterprise Linux 8 | kpatch-patch | Fixed | RHSA-2023:0839 | 21.02.2023 |
Red Hat Enterprise Linux 8.6 Extended Update Support | kernel | Fixed | RHSA-2023:1130 | 07.03.2023 |
Red Hat Enterprise Linux 8.6 Extended Update Support | kpatch-patch | Fixed | RHSA-2023:1192 | 13.03.2023 |
Показывать по
Дополнительная информация
Статус:
EPSS
7 High
CVSS3
Связанные уязвимости
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via ...
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
EPSS
7 High
CVSS3