« List of all CVEs

CVE-2023-3269

Distros-[dirtyvma] privilege escalation via non-rcu-protected vma traversal

Published: 7/11/2023 Last updated: 3/5/2025 Reserved: 6/15/2023

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 7.8 High CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Opam packages affected (29)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes ortools_solvers orun rawlink rawlink-eio rawlink-lwt restricted shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (18)

Product Vendor Version
Red Hat Enterprise Linux 9 Red Hat <= 5.4.*
Fedora Fedora <= 5.15.*
Red Hat Enterprise Linux 7 Red Hat QCA6430
Red Hat Enterprise Linux 9 Red Hat QCA6574A
Fedora Fedora QCA6595
Red Hat Enterprise Linux 6 Red Hat QCA6426
Red Hat Enterprise Linux 6 Red Hat < 1f9212cdbd005bc55f2b7422e7b560d9c02bd1da
Red Hat Enterprise Linux 7 Red Hat < 7411055db5ce64f836aaffd422396af0075fdc99
Red Hat Enterprise Linux 8 Red Hat < 2.6.29
Red Hat Enterprise Linux 8 Red Hat QCA6436
Red Hat Enterprise Linux 7 Red Hat QCA6431
Red Hat Enterprise Linux 7 Red Hat 2.6.29
Red Hat Enterprise Linux 8 Red Hat QCA6574
Red Hat Enterprise Linux 9 Red Hat <= 5.10.*
Red Hat Enterprise Linux 9 Red Hat QCA6574AU
Red Hat Enterprise Linux 8 Red Hat <= 4.19.*
kernel n/a < 0d23b34c68c46cd225b55868bc8a269e3134816d
kernel n/a QCA6421

References (36)