Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe
code paths being incorrectly marked as safe, resulting in arbitrary read/write in
kernel memory, lateral privilege escalation, and container escape.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed | Mailing List Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Google
Published: 2023-09-20T05:02:38.155Z
Updated: 2024-05-21T03:43:35.053Z
Reserved: 2023-04-18T18:22:35.441Z
Link: CVE-2023-2163
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-20T06:15:10.233
Modified: 2024-05-21T04:15:11.240
Link: CVE-2023-2163
JSON object: View
Redhat Information
No data.
CWE