« List of all CVEs

CVE-2023-3269

Distros-[dirtyvma] privilege escalation via non-rcu-protected vma traversal

Published: 7/11/2023 Last updated: 3/5/2025 Reserved: 6/15/2023

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 7.8 High CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Opam packages affected (27)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes orun rawlink rawlink-eio rawlink-lwt shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (9)

Product Vendor Version
Fedora Fedora 23.0 ap384901
Red Hat Enterprise Linux 6 Red Hat 23.0 ap384395
Red Hat Enterprise Linux 7 Red Hat from 0.20.0 to 1.8.8
Red Hat Enterprise Linux 8 Red Hat 23.0 ap384629
Red Hat Enterprise Linux 9 Red Hat n/a
Red Hat Enterprise Linux 8 Red Hat <= 3.2.4
Red Hat Enterprise Linux 7 Red Hat 23.0 ap384471
Red Hat Enterprise Linux 9 Red Hat 23.0 ap384745
kernel n/a <= 1.13.3

References (18)