
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A possible unauthorized memory access vulnerability (CVE-2023-3640) was discovered in the Linux kernel's cpuentryarea mapping of X86 CPU data to memory. The vulnerability was identified after the implementation of the 'Randomize per-cpu entry area' feature in /arch/x86/mm/cpuentryarea.c, which was introduced following CVE-2023-0597. Despite this randomization feature working through the initceaoffsets() function when KASLR is enabled, the system remains vulnerable to per-cpu entry area leaks. The vulnerability affects Linux kernel systems, particularly those running on X86 architecture (NVD, Ubuntu).
The vulnerability exists in systems with KPTI (Kernel Page Table Isolation) enabled, where the per-cpu entry area is mapped to user space. The flaw allows exploitation through prefetchnta and prefetcht2 instructions, enabling attackers to leak the per-cpu entry area through time-based attacks. The attack can be conducted in the address range of 0xfffffe0000000000-0xfffffefffffff000, with a step size of 0x3b000, potentially revealing the cpu entry area within one or two minutes. This CPU-level address leak vulnerability affects most Intel CPUs and possibly AMD CPUs due to KPTI-related issues. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (Red Hat Bugzilla).
The vulnerability allows local users to gain unauthorized access to important data stored in memory at expected locations. This access could potentially lead to privilege escalation on the affected system. The impact is particularly significant as it affects the kernel's memory protection mechanisms and could expose sensitive system data (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”