First published: Wed Jul 26 2023(Updated: )
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <6.3 | |
Fedoraproject Fedora | =38 | |
Redhat Enterprise Linux | =9.0 | |
Linux kernel | ||
redhat/kernel | <6.3 | 6.3 |
Linux Linux kernel | >=5.19<6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this vulnerability is CVE-2023-39191.
The title of this vulnerability is Linux Kernel eBPF Improper Input Validation Privilege Escalation Vulnerability.
The severity of CVE-2023-39191 is high with a severity value of 8.2.
This vulnerability can be exploited by local attackers who have obtained the ability to execute high-privileged code on the target system.
Yes, there are some references related to this vulnerability. You can find them at the following links: [Link 1](https://lwn.net/Articles/895885), [Link 2](https://lore.kernel.org/all/20230121002241.2113993-1-memxor@gmail.com/), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2242087).