8.2
CVSSv3

CVE-2023-39191

Published: 04/10/2023 Updated: 25/01/2024
CVSS v3 Base Score: 8.2 | Impact Score: 6 | Exploitability Score: 1.5
VMScore: 0

Vulnerability Summary

This vulnerability allows local malicious users to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 38

redhat enterprise linux 9.0

Vendor Advisories

概述 Important: kpatch-patch security update 类型/严重性 Security Advisory: Important Red Hat Insights 补丁分析 识别并修复受此公告影响的系统。 查看受影响的系统 标题 An update for kpatch-patch is now available for Red Hat Enterprise Linux 92 Extended Update SupportRed Hat Product Security has rat ...
Synopsis Low: Logging Subsystem 581- Red Hat OpenShift security update Type/Severity Security Advisory: Low Topic An update is now available for RHOL-58-RHEL-9Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, i ...
Description<!---->An improper input validation flaw was found in the eBPF subsystem in the Linux kernel The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the conte ...
Hello All,The Stable channel is being updated to&nbsp;12006099203&nbsp;(Platform version:&nbsp;15662640)&nbsp;for most ChromeOS devices and will be rolled out over the next few daysIf you find new issues, please let us know one of the following ways:File a bug&nbsp;Visit our Chrome OS communitiesGeneral:&nbsp;Chromebook Help CommunityBeta Spe ...