Description
In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-25432 | In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Ubuntu USN |
USN-6383-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
References
History
Wed, 09 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-10-09T14:25:06.851Z
Reserved: 2022-11-03T22:37:50.653Z
Link: CVE-2023-21264
Updated: 2024-08-02T09:28:26.162Z
Status : Modified
Published: 2023-08-14T21:15:11.893
Modified: 2024-11-21T07:42:30.903
Link: CVE-2023-21264
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN