CVE-2023-46813

Updated: 2025-08-20 00:30:11.857215

Description:

An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.0 HIGH Released CLSA-2025:1743193221 2024-09-02 17:38:29
CentOS 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-12-26 13:10:13
CentOS 7 ELS kernel 3.10.0 7.0 HIGH Not Vulnerable 2024-07-02 11:21:32
CentOS 8.4 ELS kernel 4.18.0 7.0 HIGH Released CLSA-2023:1701963303 2023-12-07 13:10:24
CentOS 8.5 ELS kernel 4.18.0 7.0 HIGH Released CLSA-2023:1701962635 2023-12-07 13:10:25
CloudLinux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2024-05-08 10:18:58
Oracle Linux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-12-26 13:10:11
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.0 HIGH Not Vulnerable 2023-11-27 08:39:03
Ubuntu 16.04 ELS linux 4.4.0 7.0 HIGH Not Vulnerable 2023-11-27 08:39:03
Ubuntu 18.04 ELS linux 4.15.0 7.0 HIGH Not Vulnerable 2023-11-27 08:39:03