Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12250 | A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system. |
Solution
No solution given by the vendor.
Workaround
The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space. For the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled. For the Red Hat Enterprise Linux 8 or 9 to confirm the current state, inspect the sysctl with the command: # cat /proc/sys/kernel/unprivileged_bpf_disabled The setting of 1 would mean that unprivileged users cannot use eBPF, mitigating the flaw. A kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities. Note: A fix for this CVE may be backported as a part of one of the future BPF subsystem rebases.
Thu, 26 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-26T19:33:49.046Z
Reserved: 2023-01-10T16:03:54.488Z
Link: CVE-2023-0160
Updated: 2024-08-02T05:02:43.790Z
Status : Modified
Published: 2023-07-18T17:15:11.313
Modified: 2024-11-21T07:36:39.893
Link: CVE-2023-0160
OpenCVE Enrichment
No data.
EUVD