Distros-[dirtyvma] privilege escalation via non-rcu-protected vma traversal
CVE-2023-3269

7.8HIGH

Key Information:

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2023-3269?

A critical vulnerability has been identified in the memory management subsystem of the Linux kernel. This flaw involves improper lock handling when accessing and updating virtual memory areas (VMAs), resulting in use-after-free conditions. Exploiting this vulnerability allows attackers to execute arbitrary code within the kernel, escalate privileges in containerized environments, and potentially gain root access. Organizations utilizing affected versions of the Linux kernel are urged to apply security updates promptly to mitigate the risk.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

.