A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
2023-07-11T12:15:10.047
2024-11-21T08:16:52.040
Modified
CVSSv3.1: 7.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 6.1.37 | Yes |
Operating System | linux | linux_kernel | < 6.3.11 | Yes |
Operating System | linux | linux_kernel | 6.4 | Yes |
Operating System | linux | linux_kernel | 6.4 | Yes |
Operating System | linux | linux_kernel | 6.4 | Yes |
Operating System | linux | linux_kernel | 6.4 | Yes |
Operating System | linux | linux_kernel | 6.4 | Yes |
Operating System | linux | linux_kernel | 6.4 | Yes |
Operating System | linux | linux_kernel | 6.4 | Yes |
Operating System | linux | linux_kernel | 6.4 | Yes |
Operating System | fedoraproject | fedora | 37 | Yes |
Operating System | fedoraproject | fedora | 38 | Yes |
Operating System | redhat | enterprise_linux | 6.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |
Operating System | redhat | enterprise_linux | 9.0 | Yes |