CVE-2023-3269
HIGH EXPLOITEDLinux Kernel < 6.1.37 - Use After Free
Title source: ruleDescription
A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
Exploits (1)
References (9)
Scores
CVSS v3
7.8
EPSS
0.0022
EPSS Percentile
45.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2024-12-06
CWE
CWE-416
Status
published
Products (8)
fedoraproject/fedora
37
fedoraproject/fedora
38
linux/linux_kernel
6.4 (8 CPE variants)
linux/linux_kernel
6.1 - 6.1.37
redhat/enterprise_linux
6.0
redhat/enterprise_linux
7.0
redhat/enterprise_linux
8.0
redhat/enterprise_linux
9.0
Published
Jul 11, 2023
Tracked Since
Feb 18, 2026