Description
A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5448-1 | linux security update |
EUVD |
EUVD-2023-43945 | A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges. |
Ubuntu USN |
USN-6249-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6250-1 | Linux kernel vulnerabilities |
References
History
Wed, 05 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-03-05T18:54:16.670Z
Reserved: 2023-06-15T10:41:19.478Z
Link: CVE-2023-3269
Updated: 2024-08-02T06:48:08.541Z
Status : Modified
Published: 2023-07-11T12:15:10.047
Modified: 2024-11-21T08:16:52.040
Link: CVE-2023-3269
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN