Description
In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Published: 2023-08-14
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-25432 In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Ubuntu USN Ubuntu USN USN-6383-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6466-1 Linux kernel (NVIDIA) vulnerabilities
History

Wed, 09 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2024-10-09T14:25:06.851Z

Reserved: 2022-11-03T22:37:50.653Z

Link: CVE-2023-21264

cve-icon Vulnrichment

Updated: 2024-08-02T09:28:26.162Z

cve-icon NVD

Status : Modified

Published: 2023-08-14T21:15:11.893

Modified: 2024-11-21T07:42:30.903

Link: CVE-2023-21264

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses