7.8
CVSSv3

CVE-2023-2008

Published: 14/04/2023 Updated: 06/07/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

This vulnerability allows local malicious users to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 5.19

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 90 Extended Update SupportRed Hat Product Securit ...
Synopsis Important: kpatch-patch security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kpatch-patch is now available for Red Hat Enterprise Linux 90 Extended Update SupportRed Hat Product Securit ...
DescriptionThe MITRE CVE dictionary describes this issue as: A flaw was found in the Linux kernel's udmabuf device driver The specific flaw exists within a fault handler The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array An attacker can leverage this vulnerabil ...

Github Repositories

Proof of concept code for CVE-2023-2008

CVE-2023-2008 Proof of concept exploit for CVE-2023-2008, a bug in the udmabuf driver of the Linux kernel fixed in 519-rc4 You can find a description of the bug and the exploitation strategy in our blog post The exploit was tested on a vulnerable Ubuntu 2204, and it requires access to the /dev/udmabuf device This is only accessible to users in the kvm group, so you may nee