First published: Fri Oct 27 2023(Updated: )
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <6.5.9 | |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP8 IF01 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2023-46813.
The severity of CVE-2023-46813 is high with a severity value of 7.
CVE-2023-46813 affects Linux kernel versions before 6.5.9.
CVE-2023-46813 is a vulnerability in the Linux kernel that allows local users with userspace access to MMIO registers to gain arbitrary write access to kernel memory.
To fix CVE-2023-46813, update your Linux kernel to version 6.5.9 or later.