CVE-2023-3269

HIGH EXPLOITED

Linux Kernel < 6.1.37 - Use After Free

Title source: rule

Description

A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.

Exploits (1)

nomisec WORKING POC 494 stars
by lrh2000 · local
https://github.com/lrh2000/StackRot

Scores

CVSS v3 7.8
EPSS 0.0022
EPSS Percentile 45.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Details

VulnCheck KEV 2024-12-06
CWE
CWE-416
Status published
Products (8)
fedoraproject/fedora 37
fedoraproject/fedora 38
linux/linux_kernel 6.4 (8 CPE variants)
linux/linux_kernel 6.1 - 6.1.37
redhat/enterprise_linux 6.0
redhat/enterprise_linux 7.0
redhat/enterprise_linux 8.0
redhat/enterprise_linux 9.0
Published Jul 11, 2023
Tracked Since Feb 18, 2026