CVE-2023-0266
ENISA EUVD: EUVD-2023-12345 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 5, 2026
2 articles
Published: 2023-01-30
EPSS Score
Source: FIRST.org · 2026-05-23
0.15%
probability
This CVE has a 0.15% probability
of being exploited in the next 30 days.
0%
Top 34.9th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.9
HIGH
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
Description
VulnerabilityLookup (CNA)A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
Affected Products
Linux
Linux Kernel
4.14
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Discovered
Jan. 12, 2023
Patched
May 1, 2023
Reported by
Clement Lecigne of the Google Threat Analysis Group
Root Cause Analysis
???
Exploits & PoC
SeanHeelan/claude_opus_cve_2023_0266
Demo showing Claude Opus does not find CVE-2023-0266
17
2024-03-19
1 repo — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
95%
EPSS
0.15%
CVSS v3.1
7.9
Mentions
2
Last Seen
Mar 29, 2023
CNA Information
CNA Assigner
Google
CNA Title
Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel
Analyst Note
Auto-imported from Google Project Zero — confirmed zero-day by definition.
Triage Info
Decided atMar 05, 2026
Published DateJan 30, 2023