Use-After-Free Vulnerability in ALSA PCM Package Could Lead to Privilege Escalation
CVE-2023-0266
Key Information:
Badges
Summary
A vulnerability has been identified in the ALSA PCM package of the Linux Kernel, characterized by a use after free condition linked to the SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 operations. The absence of proper locking mechanisms allows for the use after free exploit, potentially enabling a local attacker to achieve privilege escalation and gain ring0 access from a system user account. It is crucial to upgrade to a secure version beyond commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e to mitigate this risk.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply updates per vendor instructions.
Affected Version(s)
Linux Kernel 4.14 < 56b88b50565cd8b946a2d00b0c83927b7ebb055e
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Analyzing a Modern In-the-wild Android Exploit
By Seth Jenkins, Project ZeroIntroductionIn December 2022, Google’s Threat Analysis Group (TAG) discovered an in-the-wild exploit chain targeting Samsung Android devices. TAG’s blog post covers the targeting...
GitHub - SeanHeelan/claude_opus_cve_2023_0266: Demo showing Claude Opus does not find CVE-2023-0266
Demo showing Claude Opus does not find CVE-2023-0266 - SeanHeelan/claude_opus_cve_2023_0266
New Android updates fix kernel bug exploited in spyware attacks
Android security updates released this month patch a high-severity vulnerability exploited as a zero-day to install commercial spyware on compromised devices.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 🦅
CISA Reported
- 📰
First article discovered by Google Blog
Vulnerability published
Vulnerability Reserved