CVE-2023-0266

KEV
Published: Gen 30, 2023 Last Modified: Ott 24, 2025 EU-VD ID: EUVD-2023-12345 Aliases: GSD-2023-0266
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,9
Attack Vector: adjacent_network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: low
Integrity: high
Availability: high

Description

AI Translation Available

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0008
Percentile
0,2th
Updated

EPSS Score Trend (Last 90 Days)

416

Use After Free

Stable
Common Consequences
Security Scopes Affected:
Integrity Availability Confidentiality
Potential Impacts:
Modify Memory Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands
Applicable Platforms
Languages: C, C++, Memory-Unsafe
View CWE Details
Operating System

Linux Kernel by Linux

Version Range Affected
From 5.16 (inclusive)
To 6.1.6 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.20 (inclusive)
To 5.4.229 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.15 (inclusive)
To 4.19.270 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 5.5 (inclusive)
To 5.10.163 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 5.11 (inclusive)
To 5.15.88 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.14 (inclusive)
To 4.14.303 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023…
https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb05…
https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02…
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/qu…
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb05…
https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02…
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/qu…
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html