Vulnerability Details : CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
Vulnerability category: Execute code
Products affected by CVE-2023-39191
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-39191
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39191
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.2
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
1.5
|
6.0
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
1.5
|
6.0
|
Red Hat, Inc. |
CWE ids for CVE-2023-39191
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2023-39191
-
https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/
ZDI-23-1489 | Zero Day InitiativePatch;Third Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2023:6583
RHSA-2023:6583 - Security Advisory - Red Hat カスタマーポータルThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:0439
RHSA-2024:0439 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/security/cve/CVE-2023-39191
CVE-2023-39191- Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:0381
RHSA-2024:0381 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2226783
2226783 – (CVE-2023-39191, ZDI-CAN-19399) CVE-2023-39191 kernel: eBPF: insufficient stack type checks in dynptrIssue Tracking;Patch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:0448
RHSA-2024:0448 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to