Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-3640
HistoryJul 24, 2023 - 12:00 a.m.

CVE-2023-3640

2023-07-2400:00:00
ubuntu.com
ubuntu.com
28

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

5.2%

A possible unauthorized memory access flaw was found in the Linux kernel’s
cpu_entry_area mapping of X86 CPU data to memory, where a user may guess
the location of exception stacks or other important data. Based on the
previous CVE-2023-0597, the ‘Randomize per-cpu entry area’ feature was
implemented in /arch/x86/mm/cpu_entry_area.c, which works through the
init_cea_offsets() function when KASLR is enabled. However, despite this
feature, there is still a risk of per-cpu entry area leaks. This issue
could allow a local user to gain access to some important data with memory
in an expected location and potentially escalate their privileges on the
system.

Bugs

Notes

Author Note
sbeattie appears unfixed upstream as of 2023-09-01

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

5.2%