A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
| Version | Score | Severity | Vector String |
|---|---|---|---|
| 3.1 | 7.8 | High | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
| Product | Vendor | Version |
|---|---|---|
| Fedora | Fedora | 23.0 ap384901 |
| Red Hat Enterprise Linux 6 | Red Hat | 23.0 ap384395 |
| Red Hat Enterprise Linux 7 | Red Hat | from 0.20.0 to 1.8.8 |
| Red Hat Enterprise Linux 8 | Red Hat | 23.0 ap384629 |
| Red Hat Enterprise Linux 9 | Red Hat | n/a |
| Red Hat Enterprise Linux 8 | Red Hat | <= 3.2.4 |
| Red Hat Enterprise Linux 7 | Red Hat | 23.0 ap384471 |
| Red Hat Enterprise Linux 9 | Red Hat | 23.0 ap384745 |
| kernel | n/a | <= 1.13.3 |