An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2023-10-27T00:00:00
Updated: 2024-08-02T20:53:21.700Z
Reserved: 2023-10-27T00:00:00
Link: CVE-2023-46813
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-10-27T03:15:08.270
Modified: 2024-11-21T08:29:21.497
Link: CVE-2023-46813
Redhat