Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gxg7-pxwf-9r28

Опубликовано: 04 окт. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 8.2

Описание

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

EPSS

Процентиль: 1%
0.00012
Низкий

8.2 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8.2
ubuntu
около 2 лет назад

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 8.2
redhat
около 2 лет назад

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 8.2
nvd
около 2 лет назад

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

CVSS3: 8.2
msrc
около 2 лет назад

Kernel: ebpf: insufficient stack type checks in dynptr

CVSS3: 8.2
debian
около 2 лет назад

An improper input validation flaw was found in the eBPF subsystem in t ...

EPSS

Процентиль: 1%
0.00012
Низкий

8.2 High

CVSS3

Дефекты

CWE-20