CVE-2023-39191

high

Description

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

References

https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/

https://bugzilla.redhat.com/show_bug.cgi?id=2226783

https://access.redhat.com/security/cve/CVE-2023-39191

https://access.redhat.com/errata/RHSA-2024:0448

https://access.redhat.com/errata/RHSA-2024:0439

https://access.redhat.com/errata/RHSA-2024:0381

https://access.redhat.com/errata/RHSA-2023:6583

Details

Source: Mitre, NVD

Published: 2023-10-04

Updated: 2024-08-21

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 8.2

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Severity: High