Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-3269

Опубликовано: 11 июл. 2023
Источник: debian

Описание

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.3.11-1package
linuxnot-affectedbullseyepackage
linuxnot-affectedbusterpackage

Примечания

  • https://github.com/lrh2000/StackRot

  • https://www.openwall.com/lists/oss-security/2023/07/05/1

  • https://www.openwall.com/lists/oss-security/2023/07/28/1

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.

CVSS3: 7.8
redhat
больше 2 лет назад

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.

CVSS3: 7.8
nvd
больше 2 лет назад

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.

CVSS3: 7.8
msrc
больше 2 лет назад

Distros-[dirtyvma] privilege escalation via non-rcu-protected vma traversal

CVSS3: 7.8
github
больше 2 лет назад

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.

Уязвимость CVE-2023-3269