Vulnerability Details : CVE-2023-1582
A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
Vulnerability category: Denial of service
Products affected by CVE-2023-1582
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.7:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.7:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.7:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.7:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.7:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.7:rc7:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-1582
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-1582
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.0
|
3.6
|
NIST |
CWE ids for CVE-2023-1582
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2023-1582
-
https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/
Re: [stable-5.15 PATCH] fs/proc: task_mmu.c: don't read mapcount for migration entry - Greg KHMailing List;Patch
Jump to