An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
2023-10-04T19:15:10.210
2024-11-21T08:14:52.967
Modified
CVSSv3.1: 8.2 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 6.3 | Yes |
Operating System | fedoraproject | fedora | 38 | Yes |
Operating System | redhat | enterprise_linux | 9.0 | Yes |