CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 6.4 | cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:* |
linux | linux_kernel | 6.4 | cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:* |
linux | linux_kernel | 6.4 | cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:* |
linux | linux_kernel | 6.4 | cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:* |
linux | linux_kernel | 6.4 | cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:* |
linux | linux_kernel | 6.4 | cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:* |
linux | linux_kernel | 6.4 | cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:* |
linux | linux_kernel | 6.4 | cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:* |
fedoraproject | fedora | 37 | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
seclists.org/fulldisclosure/2023/Jul/43
www.openwall.com/lists/oss-security/2023/07/28/1
www.openwall.com/lists/oss-security/2023/08/25/1
www.openwall.com/lists/oss-security/2023/08/25/4
access.redhat.com/security/cve/CVE-2023-3269
bugzilla.redhat.com/show_bug.cgi?id=2215268
lists.fedoraproject.org/archives/list/[email protected]/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/
security.netapp.com/advisory/ntap-20230908-0001/
www.openwall.com/lists/oss-security/2023/07/05/1