Vulnerabilities > CVE-2023-3269 - Use After Free vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://access.redhat.com/security/cve/CVE-2023-3269
- https://bugzilla.redhat.com/show_bug.cgi?id=2215268
- https://www.openwall.com/lists/oss-security/2023/07/05/1
- https://lists.fedoraproject.org/archives/list/[email protected]/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/
- http://www.openwall.com/lists/oss-security/2023/07/28/1
- http://seclists.org/fulldisclosure/2023/Jul/43
- http://www.openwall.com/lists/oss-security/2023/08/25/1
- http://www.openwall.com/lists/oss-security/2023/08/25/4
- https://security.netapp.com/advisory/ntap-20230908-0001/