{"id":"CVE-2023-46813","details":"An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.","modified":"2026-03-14T14:55:42.378732Z","published":"2023-10-27T03:15:08.270Z","related":["ALSA-2024:0897","MGASA-2023-0328","MGASA-2023-0331","SUSE-SU-2023:4345-1","SUSE-SU-2023:4351-1","SUSE-SU-2023:4375-1","SUSE-SU-2023:4414-1","SUSE-SU-2023:4732-1","SUSE-SU-2024:0986-1","SUSE-SU-2024:0995-1","SUSE-SU-2024:1023-1","SUSE-SU-2024:1039-1","SUSE-SU-2024:1045-1","SUSE-SU-2024:1063-1","SUSE-SU-2024:1097-1","USN-6652-1","openSUSE-SU-2024:13405-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1212649"},{"type":"FIX","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46813.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"6.5.9"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}