{"vulnerability": "CVE-2023-21400", "sightings": [{"uuid": "b63ca0a1-4627-492c-91f5-ce4ba8cb0a6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21400", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/216", "content": "Dirty Pagetable: A Novel Exploitation Technique To Rule Linux Kernel\n\nAn article by Nicolas Wu about the Dirty Pagetable exploitation technique.\n\nDirty Pagetable enables using a slab bug to overwrite userspace Page Table Entries and gain arbitrary read/write access to physical memory.\n\nTo demonstrate the technique, Nicolas Wu and Ye Zhang wrote a few exploits, including one for CVE-2023-21400, a racy slab double-free in the io_uring subsystem. The exploit gains root on Pixel 7.", "creation_timestamp": "2023-07-12T23:20:58.000000Z"}, {"uuid": "f1cdb5cd-d758-453c-981f-98926d318efb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21400", "type": "published-proof-of-concept", "source": "https://t.me/cyboghostultimate/15", "content": "Exploit Google Pixel 7\n\nIn detail analysis of exploiting CVE-2023-21400 on Google Pixel 7 with Dirty Pagetable exploit that uses file UAF and pid UAF vulnerabilities \nhttps://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html", "creation_timestamp": "2023-07-30T12:35:37.000000Z"}, {"uuid": "f9e4947e-74e0-49d9-83f2-2d22cf0ccf59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21400", "type": "published-proof-of-concept", "source": "https://t.me/poenamarket/1260", "content": "Exploit Google Pixel 7\n\nIn detail analysis of exploiting CVE-2023-21400 on Google Pixel 7 with Dirty Pagetable exploit that uses file UAF and pid UAF vulnerabilities \nhttps://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html", "creation_timestamp": "2023-08-26T04:36:19.000000Z"}, {"uuid": "8b77464f-394a-4eaf-aa3a-cb5080dd0450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21400", "type": "seen", "source": "https://t.me/ctinow/170327", "content": "https://ift.tt/YcUFJnH\nCVE-2023-21400 Linux Kernel Vulnerability in NetApp Products", "creation_timestamp": "2024-01-19T18:32:04.000000Z"}, {"uuid": "8f1acfbe-0710-4db1-9c2b-05ea08cfa419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21400", "type": "seen", "source": "https://t.me/cibsecurity/66628", "content": "\u203c CVE-2023-21400 \u203c\n\nIn multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T07:45:31.000000Z"}, {"uuid": "eae2c1ef-4b30-4365-af0b-985c4cecfeba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21400", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1941", "content": "Exploit Google Pixel 7\n\nIn detail analysis of exploiting CVE-2023-21400 on Google Pixel 7 with Dirty Pagetable exploit that uses file UAF and pid UAF vulnerabilities \nhttps://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html", "creation_timestamp": "2023-08-07T11:03:33.000000Z"}, {"uuid": "07234393-90d9-4540-a9a6-67caf8e4526b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21400", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/7509", "content": "Exploit Google Pixel 7\n\nIn detail analysis of exploiting CVE-2023-21400 on Google Pixel 7 with Dirty Pagetable exploit that uses file UAF and pid UAF vulnerabilities \nhttps://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html", "creation_timestamp": "2023-07-11T14:07:56.000000Z"}]}