Headline
CVE-2023-39191: Invalid Bug ID
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
‘2226783?cve=title’ is not a valid bug number nor an alias to a bug.
Please press Back and try again.
Related news
Red Hat Security Advisory 2024-0381-03
Red Hat Security Advisory 2024-0381-03 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include a use-after-free vulnerability.