A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
CPE | Name | Operator | Version |
---|---|---|---|
fedora | eq | 37 | |
fedora | eq | 38 | |
linux_kernel | eq | 6.4 rc1 | |
linux_kernel | eq | 6.4 rc4 | |
linux_kernel | eq | 6.4 rc5 | |
linux_kernel | eq | 6.4 rc6 | |
linux_kernel | eq | 6.4 rc2 | |
linux_kernel | eq | 6.4 rc3 | |
linux_kernel | eq | 6.4 rc7 | |
linux_kernel | eq | 6.4 |
seclists.org/fulldisclosure/2023/Jul/43
www.openwall.com/lists/oss-security/2023/07/28/1
www.openwall.com/lists/oss-security/2023/08/25/1
www.openwall.com/lists/oss-security/2023/08/25/4
access.redhat.com/security/cve/CVE-2023-3269
bugzilla.redhat.com/show_bug.cgi?id=2215268
lists.fedoraproject.org/archives/list/[email protected]/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/
security.netapp.com/advisory/ntap-20230908-0001/
www.openwall.com/lists/oss-security/2023/07/05/1