mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
2.2 KiB
2.2 KiB
CVE-2023-3269
Description
A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
POC
Reference
- http://seclists.org/fulldisclosure/2023/Jul/43
- http://seclists.org/fulldisclosure/2023/Jul/43
- http://www.openwall.com/lists/oss-security/2023/07/28/1
- http://www.openwall.com/lists/oss-security/2023/07/28/1
- http://www.openwall.com/lists/oss-security/2023/08/25/4
- http://www.openwall.com/lists/oss-security/2023/08/25/4
Github
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
- https://github.com/LumaKernel/awesome-stars
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/aneasystone/github-trending
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/hktalent/TOP
- https://github.com/izj007/wechat
- https://github.com/johe123qwe/github-trending
- https://github.com/kherrick/hacker-news
- https://github.com/kun-g/Scraping-Github-trending
- https://github.com/lrh2000/StackRot
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/whoami13apt/files2
- https://github.com/xairy/linux-kernel-exploitation