CVE-2023-46813

Updated: 2024-01-11 19:23:39.214836

Description:

An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU kernel 5.14.0 7 HIGH Released CLSA-2024:1725293298 2024-09-02 12:28:53
AlmaLinux 9.2 FIPS kernel 5.14.0 7 HIGH Released CLSA-2024:1725304408 2024-09-02 17:38:29
CentOS 6 ELS kernel 2.6.32 7 HIGH Not Vulnerable 2023-12-26 13:10:13
CentOS 7 ELS kernel 3.10.0 7 HIGH Not Vulnerable 2024-07-02 11:21:32
CentOS 8.4 ELS kernel 4.18.0 7 HIGH Released CLSA-2023:1701963303 2023-12-07 13:10:24
CentOS 8.5 ELS kernel 4.18.0 7 HIGH Released CLSA-2023:1701962635 2023-12-07 13:10:25
CloudLinux 6 ELS kernel 2.6.32 7 HIGH Not Vulnerable 2024-05-08 10:18:58
Oracle Linux 6 ELS kernel 2.6.32 7 HIGH Not Vulnerable 2023-12-26 13:10:11
Ubuntu 16.04 ELS linux 4.4.0 7 HIGH Not Vulnerable 2023-11-27 08:39:03
Ubuntu 16.04 ELS linux-hwe 4.15.0 7 HIGH Not Vulnerable 2023-11-27 08:39:03
Total: 11