Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gxg7-pxwf-9r28

Опубликовано: 04 окт. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 8.2

Описание

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

EPSS

Процентиль: 1%
0.00012
Низкий

8.2 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8.2
ubuntu
больше 1 года назад

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 8.2
redhat
больше 1 года назад

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 8.2
nvd
больше 1 года назад

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 8.2
debian
больше 1 года назад

An improper input validation flaw was found in the eBPF subsystem in t ...

CVSS3: 8.2
fstec
больше 2 лет назад

Уязвимость подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 1%
0.00012
Низкий

8.2 High

CVSS3

Дефекты

CWE-20