A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 08:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2023/Jul/43 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/07/28/1 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2023/08/25/1 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2023/08/25/4 - Mailing List | |
References | () https://access.redhat.com/security/cve/CVE-2023-3269 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2215268 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/ - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230908-0001/ - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2023/07/05/1 - Mailing List |
29 Jul 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Jul 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jul 2023, 01:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | (MISC) https://www.openwall.com/lists/oss-security/2023/07/05/1 - Mailing List | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-3269 - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/ - Mailing List, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2215268 - Issue Tracking, Patch, Third Party Advisory | |
CWE | CWE-416 |
12 Jul 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jul 2023, 12:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-11 12:15
Updated : 2024-11-21 08:16
NVD link : CVE-2023-3269
Mitre link : CVE-2023-3269
CVE.ORG link : CVE-2023-3269
JSON object : View
Products Affected
linux
- linux_kernel
redhat
- enterprise_linux
fedoraproject
- fedora
CWE
CWE-416
Use After Free