[Reproduced] Linux Kernel Privilege Escalation Vulnerability (CVE-2023-3269) Security Risk Notice

● Click the ↑ blue word to follow us and get more security risk notices


Vulnerability overview

Vulnerability name

Linux Kernel Privilege Escalation Vulnerability

Vulnerability number

QVD-2023-15242、CVE-2023-3269

open time

2023-07-05

Affected object magnitude

10,000 level

Qi Anxin Rating

high risk

CVSS 3.1 score

7.8

threat type

privilege escalation

use possibility

middle

PoC status

published

state of use in the wild

Not found

EXP state

published

Technical Details Status

published

Conditions of use: Need local low-privilege trigger.

(Note: Qi Anxin CERT's in-depth vulnerability analysis report includes the POC and technical details of this vulnerability. See the end of the article for subscription methods.)

01

Vulnerability details

>>>>

affect components

The Linux kernel is the main component of the Linux operating system (OS) and the core interface between computer hardware and its processes. It is responsible for the communication between the two and also manages resources as efficiently as possible.

>>>>

Vulnerability description

Recently, Qi Anxin CERT detected a Linux Kernel privilege escalation vulnerability (CVE-2023-3269) , also known as "Stack Rot" . There is a reuse-after-free vulnerability in the memory management subsystem of the Linux kernel. Local low-privileged users can use this vulnerability to elevate to ROOT privileges. At present, the technical details, POC and EXP of this vulnerability have been made public on the Internet, and Qi Anxin CERT has successfully reproduced this vulnerability. In view of the rising threat of this vulnerability, customers are advised to do self-examination and protection as soon as possible.

02

Sphere of influence

>>>>

Affected version

v6.1-rc1 <= Linux Kernel <= v6.5-rc1

>>>>

unaffected version

RedHat Linux Kernel

>>>>

Other affected components

none

03

Recurrence

At present, Qi Anxin CERT has successfully reproduced the Linux Kernel privilege escalation vulnerability (CVE-2023-3269) , the screenshot is as follows:

5d6313f6c9809c958c970958d85966f6.png

04

disposal advice

>>>>

security update

At present, the official version has been released, and affected users can update the kernel to a safe version: 

Linux Kernel >= 6.1.37 

Linux Kernel >= 6.3.11 

Linux Kernel >= 6.4.1

05

References

[1]https://www.openwall.com/lists/oss-security/2023/07/05/1

[2]https://security-tracker.debian.org/tracker/CVE-2023-3269

[3]https://ubuntu.com/security/CVE-2023-3269

[4]https://access.redhat.com/security/cve/cve-2023-3269

06

timeline

On August 1, 2023, Qi Anxin CERT issued a security risk notice.

07

In-depth analysis report

The in-depth analysis report (including PoC and technical details) has been subscribed, scan the QR code below the picture to apply:

b7189d6e66de34b49e3a4c2a61d3ca75.png

Please indicate "Reprinted from Qi Anxin Code Guard https://codesafe.qianxin.com".

478c161f769f2c40c8ecb2fc27108bbb.jpeg

f01192fad29d3de4b4cce185680ef784.jpeg

Qi Anxin code guard (codesafe)

The first domestic product line focusing on software development security.

   3689884cd29cece0d2a027f0a400a4bf.gif If you feel good, just click "Looking" or "Like"~

Guess you like

Origin blog.csdn.net/smellycat000/article/details/132222404
Recommended