CVE-2023-3269

Updated: 2024-11-23 04:48:48.492686

Description:

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Not Vulnerable 2024-01-19 16:10:05
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2023-08-28 04:19:46
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2023-11-03 09:32:55
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2023-08-28 04:19:46
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2023-08-28 04:19:46
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2023-08-28 04:19:46
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2023-08-28 04:19:46
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Not Vulnerable 2023-08-15 09:14:57
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Not Vulnerable 2023-08-15 09:14:57
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Not Vulnerable 2023-08-28 04:19:46