An improper input validation flaw was found in the eBPF...
High severity
Unreviewed
Published
Oct 4, 2023
to the GitHub Advisory Database
•
Updated Aug 21, 2024
Description
Published by the National Vulnerability Database
Oct 4, 2023
Published to the GitHub Advisory Database
Oct 4, 2023
Last updated
Aug 21, 2024
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
References