Linux Kernel Vulnerability Exposes Local Systems to Privilege Escalation, PoC Published - #CVE-2023-6931
A high-severity vulnerability (CVE-2023-6931) has been discovered in the Linux kernel's Performance Events system, with a CVSS score of 7.8. This heap out-of-bounds write flaw in the `perf_event` component could lead to local privilege escalation, affecting kernel versions since 3.16. The exploit leverages heap spraying and netlink socket objects to bypass KASLR and execute a ROP chain, potentially granting root shell access. The vulnerability has been patched in kernel version 6.7, and users are strongly advised to update their systems. With the technical details and proof-of-concept now public on GitHub, the urgency to patch affected systems has increased, especially in shared hosting environments or systems with unprivileged user access.