VYPR
Unrated severityNVD Advisory· Published Oct 4, 2023· Updated Nov 6, 2025

Kernel: ebpf: insufficient stack type checks in dynptr

CVE-2023-39191

Description

An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.

Affected products

57

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.