CVE-2023-3640

HIGH

Linux Kernel - Information Disclosure

Title source: rule
STIX 2.1

Description

A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.

Exploits (1)

nomisec WORKING POC 29 stars
by pray77 · poc
https://github.com/pray77/CVE-2023-3640

References (3)

Core 3
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2023:6583
Third Party Advisory vdb-entry x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2023-3640
Issue Tracking, Third Party Advisory issue-tracking x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2217523

Scores

CVSS v3 7.0
EPSS 0.0015
EPSS Percentile 35.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-203
Status published
Products (3)
linux/linux_kernel
redhat/enterprise_linux 8.0
redhat/enterprise_linux 9.0
Published Jul 24, 2023
Tracked Since Feb 18, 2026