6.7 CVE-2023-21400
Exploit
In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.
https://nvd.nist.gov/vuln/detail/CVE-2023-21400
Categories
CWE-667
References
af854a3a-2127-422b-91ae-364da2661108 Exploit
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice... Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2023/07/14/2 Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/07/19/2 Exploit Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/07/19/7 Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/07/25/7 Mailing List |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240119-0012/ |
https://source.android.com/security/bulletin/pixel/2023-07-01 Vendor Advisory |
https://www.debian.org/security/2023/dsa-5480 Third Party Advisory |
security@android.com Exploit
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice... Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2023/07/14/2 Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/07/19/2 Exploit Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/07/19/7 Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/07/25/7 Mailing List |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240119-0012/ |
https://source.android.com/security/bulletin/pixel/2023-07-01 Vendor Advisory |
https://www.debian.org/security/2023/dsa-5480 Third Party Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:o:google:android:-:*:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
Other Nist (github, ...)
Url |
---|
http://www.openwall.com/lists/oss-security/2023/07/19/2 |
http://www.openwall.com/lists/oss-security/2023/07/19/2 |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.