7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
25.6%
A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
seclists.org/fulldisclosure/2023/Jul/43
www.openwall.com/lists/oss-security/2023/07/28/1
www.openwall.com/lists/oss-security/2023/08/25/1
www.openwall.com/lists/oss-security/2023/08/25/4
access.redhat.com/security/cve/CVE-2023-3269
bugzilla.redhat.com/show_bug.cgi?id=2215268
lists.fedoraproject.org/archives/list/[email protected]/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/
security.netapp.com/advisory/ntap-20230908-0001/
www.openwall.com/lists/oss-security/2023/07/05/1
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
25.6%