Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-39191


An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.


Published

2023-10-04T19:15:10.210

Last Modified

2024-11-21T08:14:52.967

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.2 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 6.3 Yes
Operating System fedoraproject fedora 38 Yes
Operating System redhat enterprise_linux 9.0 Yes

References