A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-03-05T18:54:16.670Z

Reserved: 2023-06-15T10:41:19.478Z

Link: CVE-2023-3269

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:08.541Z

cve-icon NVD

Status : Modified

Published: 2023-07-11T12:15:10.047

Modified: 2024-11-21T08:16:52.040

Link: CVE-2023-3269

cve-icon Redhat

Severity : Important

Publid Date: 2023-07-05T00:00:00Z

Links: CVE-2023-3269 - Bugzilla

cve-icon OpenCVE Enrichment

No data.