{"id":"CVE-2023-1249","details":"A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.","modified":"2026-03-14T11:57:41.182414Z","published":"2023-03-23T21:15:19.217Z","related":["SUSE-SU-2023:2782-1","SUSE-SU-2023:2804-1","SUSE-SU-2023:2805-1","SUSE-SU-2023:2808-1","SUSE-SU-2023:2809-1","SUSE-SU-2023:2810-1","SUSE-SU-2023:2820-1","SUSE-SU-2023:2822-1","SUSE-SU-2023:2830-1","SUSE-SU-2023:2831-1","SUSE-SU-2023:2834-1","SUSE-SU-2023:2859-1","SUSE-SU-2023:2871-1","SUSE-SU-2023:2892-1"],"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html"},{"type":"WEB","url":"https://patchwork.kernel.org/project/linux-fsdevel/patch/87iltzn3nd.fsf_-_%40email.froward.int.ebiederm.org/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.18"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1249.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}