A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
Version | Score | Severity | Vector String |
---|---|---|---|
3.1 | 7.8 | High | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Product | Vendor | Version |
---|---|---|
Fedora | Fedora | 23.0 ap384901 |
Red Hat Enterprise Linux 6 | Red Hat | 23.0 ap384395 |
Red Hat Enterprise Linux 7 | Red Hat | from 0.20.0 to 1.8.8 |
Red Hat Enterprise Linux 8 | Red Hat | 23.0 ap384629 |
Red Hat Enterprise Linux 9 | Red Hat | n/a |
Red Hat Enterprise Linux 8 | Red Hat | <= 3.2.4 |
Red Hat Enterprise Linux 7 | Red Hat | 23.0 ap384471 |
Red Hat Enterprise Linux 9 | Red Hat | 23.0 ap384745 |
kernel | n/a | <= 1.13.3 |