[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2023-39191Date: (C)2023-10-05   (M)2024-05-10


An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.2CVSS Score :
Exploit Score: 1.5Exploit Score:
Impact Score: 6.0Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: HIGHAuthentication:
User Interaction: NONEConfidentiality:
Scope: CHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: HIGH 
Availability: HIGH 
  
Reference:
RHSA-2023:6583
RHSA-2024:0381
RHSA-2024:0439
RHSA-2024:0448
https://access.redhat.com/security/cve/CVE-2023-39191
https://bugzilla.redhat.com/show_bug.cgi?id=2226783
https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/

OVAL    5
oval:org.secpod.oval:def:3301714
oval:org.secpod.oval:def:89051075
oval:org.secpod.oval:def:3302335
oval:org.secpod.oval:def:19500481
...

© SecPod Technologies