CVE-2023-0266

Linux Kernel — Linux Kernel Use-After-Free Vulnerability
⚠️ CVSS 3.1  7.9 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Linux kernel contains a use-after-free vulnerability that allows for privilege escalation to gain ring0 access from the system user.

https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4; https://nvd.nist.gov/vuln/detail/CVE-2023-0266

Key Details

PropertyValue
CVE ID CVE-2023-0266
Vendor / Product Linux — Kernel
NVD Published2023-01-30
NVD Last Modified2025-10-24
CVSS 3.1 Score7.9
CVSS 3.1 VectorCVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
SeverityHIGH
CWE CWE-416
CISA KEV Added2023-03-30
CISA KEV Deadline2023-04-20
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2023-04-20. Apply updates per vendor instructions.

Timeline

DateEvent
2023-03-30Added to CISA Known Exploited Vulnerabilities catalog
2023-04-20CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2023-0266 Vulnerability Database
CISA KEV Catalog Entry US Government