A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
[
{
"events": [
{
"introduced": "6.1"
},
{
"fixed": "6.1.37"
}
]
},
{
"events": [
{
"introduced": "6.2"
},
{
"fixed": "6.3.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4-rc4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4-rc5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4-rc6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4-rc7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "37"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "38"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-3269.json"