Bug 2240249 (CVE-2023-2163) - CVE-2023-2163 kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe
Summary: CVE-2023-2163 kernel: bpf: Incorrect verifier pruning leads to unsafe code pa...
Keywords:
Status: NEW
Alias: CVE-2023-2163
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2240250
TreeView+ depends on / blocked
 
Reported: 2023-09-22 17:40 UTC by Guilherme de Almeida Suckevicz
Modified: 2024-04-17 19:06 UTC (History)
42 users (show)

Fixed In Version: kernel 6.3
Doc Type: If docs needed, set a value
Doc Text:
An incorrect verifier pruning flaw was found in BPF in the Linux Kernel that may lead to unsafe code paths incorrectly marked as safe, resulting in arbitrary read/writes in kernel memory, lateral privilege escalation, and container escape.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:0637 0 None None None 2024-02-01 00:08:54 UTC
Red Hat Product Errata RHBA-2024:0673 0 None None None 2024-02-05 10:13:03 UTC
Red Hat Product Errata RHBA-2024:0679 0 None None None 2024-02-05 11:45:45 UTC
Red Hat Product Errata RHBA-2024:0688 0 None None None 2024-02-05 17:04:10 UTC
Red Hat Product Errata RHSA-2023:7548 0 None None None 2023-11-28 15:11:39 UTC
Red Hat Product Errata RHSA-2023:7549 0 None None None 2023-11-28 15:23:52 UTC
Red Hat Product Errata RHSA-2023:7554 0 None None None 2023-11-28 17:53:10 UTC
Red Hat Product Errata RHSA-2024:0376 0 None None None 2024-01-23 17:21:45 UTC
Red Hat Product Errata RHSA-2024:0378 0 None None None 2024-01-23 17:28:27 UTC
Red Hat Product Errata RHSA-2024:0381 0 None None None 2024-01-23 17:50:28 UTC
Red Hat Product Errata RHSA-2024:0402 0 None None None 2024-01-24 15:05:14 UTC
Red Hat Product Errata RHSA-2024:0403 0 None None None 2024-01-24 15:05:42 UTC
Red Hat Product Errata RHSA-2024:0412 0 None None None 2024-01-24 16:45:15 UTC
Red Hat Product Errata RHSA-2024:0439 0 None None None 2024-01-24 16:36:30 UTC
Red Hat Product Errata RHSA-2024:0448 0 None None None 2024-01-24 16:38:20 UTC
Red Hat Product Errata RHSA-2024:0554 0 None None None 2024-01-30 00:34:15 UTC
Red Hat Product Errata RHSA-2024:0562 0 None None None 2024-01-30 12:28:08 UTC
Red Hat Product Errata RHSA-2024:0563 0 None None None 2024-01-30 12:27:15 UTC
Red Hat Product Errata RHSA-2024:0575 0 None None None 2024-01-30 13:22:21 UTC
Red Hat Product Errata RHSA-2024:0593 0 None None None 2024-01-30 13:10:33 UTC
Red Hat Product Errata RHSA-2024:1250 0 None None None 2024-03-12 00:44:31 UTC
Red Hat Product Errata RHSA-2024:1253 0 None None None 2024-03-12 01:01:07 UTC
Red Hat Product Errata RHSA-2024:1306 0 None None None 2024-03-13 09:08:23 UTC

Description Guilherme de Almeida Suckevicz 2023-09-22 17:40:46 UTC
Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

Reference and upstream patch:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed

Comment 13 errata-xmlrpc 2023-11-28 15:11:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7548 https://access.redhat.com/errata/RHSA-2023:7548

Comment 14 errata-xmlrpc 2023-11-28 15:23:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7549 https://access.redhat.com/errata/RHSA-2023:7549

Comment 15 errata-xmlrpc 2023-11-28 17:53:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7554 https://access.redhat.com/errata/RHSA-2023:7554

Comment 17 errata-xmlrpc 2024-01-23 17:21:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions

Via RHSA-2024:0376 https://access.redhat.com/errata/RHSA-2024:0376

Comment 18 errata-xmlrpc 2024-01-23 17:28:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0378 https://access.redhat.com/errata/RHSA-2024:0378

Comment 19 errata-xmlrpc 2024-01-23 17:50:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:0381 https://access.redhat.com/errata/RHSA-2024:0381

Comment 20 errata-xmlrpc 2024-01-24 15:05:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2024:0402 https://access.redhat.com/errata/RHSA-2024:0402

Comment 21 errata-xmlrpc 2024-01-24 15:05:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2024:0403 https://access.redhat.com/errata/RHSA-2024:0403

Comment 22 errata-xmlrpc 2024-01-24 16:36:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:0439 https://access.redhat.com/errata/RHSA-2024:0439

Comment 23 errata-xmlrpc 2024-01-24 16:38:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:0448 https://access.redhat.com/errata/RHSA-2024:0448

Comment 24 errata-xmlrpc 2024-01-24 16:45:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0412

Comment 25 errata-xmlrpc 2024-01-30 00:34:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:0554 https://access.redhat.com/errata/RHSA-2024:0554

Comment 26 errata-xmlrpc 2024-01-30 12:27:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:0563 https://access.redhat.com/errata/RHSA-2024:0563

Comment 27 errata-xmlrpc 2024-01-30 12:28:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:0562 https://access.redhat.com/errata/RHSA-2024:0562

Comment 28 errata-xmlrpc 2024-01-30 13:10:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:0593 https://access.redhat.com/errata/RHSA-2024:0593

Comment 29 errata-xmlrpc 2024-01-30 13:22:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:0575 https://access.redhat.com/errata/RHSA-2024:0575

Comment 32 errata-xmlrpc 2024-03-12 00:44:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1250 https://access.redhat.com/errata/RHSA-2024:1250

Comment 33 errata-xmlrpc 2024-03-12 01:01:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1253 https://access.redhat.com/errata/RHSA-2024:1253

Comment 34 errata-xmlrpc 2024-03-13 09:08:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1306 https://access.redhat.com/errata/RHSA-2024:1306


Note You need to log in before you can comment on or make changes to this bug.