CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of
shadow stack protection due to a logic error in the code. This could lead
to local escalation of privilege with no additional execution privileges
needed. User interaction is not needed for exploitation.Product:
AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream
kernel
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < 5.15.0-70.77 | UNKNOWN |
ubuntu | 22.10 | noarch | linux | < 5.19.0-42.43 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1034.38 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-aws | < 5.19.0-1025.26 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1034.38~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1036.43 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-azure | < 5.19.0-1026.29 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < 5.15.0-1036.43~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-5.19 | < 5.19.0-1026.29~22.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-fde | < 5.15.0-1036.43.1 | UNKNOWN |
git.kernel.org/linus/18bba1843fc7f264f58c9345d00827d082f9c558 (6.2-rc4)
git.kernel.org/linus/ff7a167961d1b97e0e205f245f806e564d3505e7 (6.2-rc1)
launchpad.net/bugs/cve/CVE-2023-21102
nvd.nist.gov/vuln/detail/CVE-2023-21102
security-tracker.debian.org/tracker/CVE-2023-21102
source.android.com/docs/security/bulletin/2023-05-01
ubuntu.com/security/notices/USN-6079-1
ubuntu.com/security/notices/USN-6091-1
ubuntu.com/security/notices/USN-6096-1
ubuntu.com/security/notices/USN-6134-1
www.cve.org/CVERecord?id=CVE-2023-21102