7
CVSSv3

CVE-2023-46813

Published: 27/10/2023 Updated: 11/01/2024
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 0

Vulnerability Summary

An issue exists in the Linux kernel prior to 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 90 Extended Update SupportRed Hat Product Securit ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 88 Extended Update SupportRed Hat Product Securit ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 86 Extended Update SupportRed Hat Product Securit ...
An issue was discovered in the Linux kernel before 659, exploitable by local users with userspace access to MMIO registers Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation) This depends on a race co ...
A race condition between two functions, lmLogClose() and txEnd(), in the Linux kernel's JFS filesystem can lead to a use-after-free vulnerability and crash (CVE-2023-3397) An issue was discovered in the Linux kernel before 659, exploitable by local users with userspace access to MMIO registers Incorrect access checking in the #VC handler and in ...
DescriptionThe MITRE CVE dictionary describes this issue as: An issue was discovered in the Linux kernel before 659, exploitable by local users with userspace access to MMIO registers Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memo ...
LTS-114 is being updated in the LTS channel to 11405735351 (Platform Version: 15437910) for most ChromeOS devices Want to know more about Long Term Support? Click hereThis update contains selective Security fixes, including:[40945671]     High  CVE-2024-0807 Use after free in WebAudio[40 ...

Github Repositories

CVE-2023-46813 PoC Apply the patches in the host-patches folder to the Linux host and QEMU Start an SEV-SNP VM Run the code in this repo and wait for the message "waiting for the hypervisor to change memory to MMIO" Spam the attack command in QEMU several times Once the exploit detects that the type of some of its memory has been changed to MMIO it will use the v