A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-12250 A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.
Fixes

Solution

No solution given by the vendor.


Workaround

The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space. For the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled. For the Red Hat Enterprise Linux 8 or 9 to confirm the current state, inspect the sysctl with the command: # cat /proc/sys/kernel/unprivileged_bpf_disabled The setting of 1 would mean that unprivileged users cannot use eBPF, mitigating the flaw. A kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities. Note: A fix for this CVE may be backported as a part of one of the future BPF subsystem rebases.

History

Thu, 26 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-09-26T19:33:49.046Z

Reserved: 2023-01-10T16:03:54.488Z

Link: CVE-2023-0160

cve-icon Vulnrichment

Updated: 2024-08-02T05:02:43.790Z

cve-icon NVD

Status : Modified

Published: 2023-07-18T17:15:11.313

Modified: 2024-11-21T07:36:39.893

Link: CVE-2023-0160

cve-icon Redhat

Severity : Low

Publid Date: 2023-03-12T00:00:00Z

Links: CVE-2023-0160 - Bugzilla

cve-icon OpenCVE Enrichment

No data.