CVE-2023-39191
Summary
| CVE | CVE-2023-39191 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-04 19:15:00 UTC |
| Updated | 2024-01-25 20:15:00 UTC |
| Description | An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fedoraproject | Fedora | 38 | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Redhat | Enterprise Linux | 9.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Red Hat | access.redhat.com | ||
| Red Hat | access.redhat.com | ||
| Red Hat | access.redhat.com | ||
| 2226783 – (CVE-2023-39191, ZDI-CAN-19399) CVE-2023-39191 kernel: eBPF: insufficient stack type checks in dynptr | MISC | bugzilla.redhat.com | |
| Red Hat | access.redhat.com | ||
| cve-details | MISC | access.redhat.com | |
| ZDI-23-1489 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161066 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-6583)
- 242399 Red Hat Update for kernel security (RHSA-2023:6583)
- 242734 Red Hat Update for kpatch-patch (RHSA-2024:0381)
- 242845 Red Hat Update for kernel (RHSA-2024:0448)
- 242846 Red Hat Update for kernel-rt (RHSA-2024:0439)
- 356634 Amazon Linux Security Advisory for kernel : ALAS2023-2023-422
- 6140404 AWS Bottlerocket Security Update for kernel (GHSA-qmff-hxw3-jpv4)
- 755240 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4375-1)
- 755249 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4414-1)
- 755567 SUSE Security Update for the linux kernel (SUSE-SU-2023:4343-1)
- 756013 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5) (SUSE-SU-2024:0986-1)
- 756014 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) (SUSE-SU-2024:0995-1)
- 756028 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) (SUSE-SU-2024:1023-1)
- 756030 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) (SUSE-SU-2024:1045-1)
- 756032 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) (SUSE-SU-2024:1039-1)
- 756047 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) (SUSE-SU-2024:1097-1)
- 907630 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (31150-1)