A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
[
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@97113eb39fa7972722ff490b947d8af023e1f6a2",
"target": {
"file": "mm/mremap.c"
},
"id": "CVE-2023-1476-1447b3e7",
"digest": {
"threshold": 0.9,
"line_hashes": [
"91217961197015630728940486756964662910",
"113725221842079262779860276077822911482",
"163080129153311334489943290705293830652",
"277551221773227129289435512762280905898",
"211967377129938676580548707086629794885",
"331501999063270437324018154357457769469",
"146662606903345045836793741352562119141",
"77684483817456968652211114723183858796"
]
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@97113eb39fa7972722ff490b947d8af023e1f6a2",
"target": {
"file": "mm/mremap.c",
"function": "move_page_tables"
},
"id": "CVE-2023-1476-f41d2f0b",
"digest": {
"length": 1756.0,
"function_hash": "183517765424909398880025282871145589006"
},
"signature_type": "Function"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-1476.json"