Improper input validation in Linux eBPF subsystem may lead to privilege escalatio
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
Zero Day Initiative | Linux Kernel eBPF Improper Input Validation Privilege Escalation Vulnerability | 29 Sep 202300:00 | – | zdi |
CBLMariner | CVE-2023-39191 affecting package kernel for versions less than 5.15.137.1-1 | 17 Nov 202323:23 | – | cbl_mariner |
Redos | ROS-20241004-09 | 4 Oct 202400:00 | – | redos |
Google Chrome Security Advisories | Stable Channel Update for ChromeOS / ChromeOS Flex | 8 Jan 202400:00 | – | chrome |
OpenVAS | openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2023:4375-1) | 4 Mar 202400:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2023:4343-1) | 4 Mar 202400:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2023:4414-1) | 4 Mar 202400:00 | – | openvas |
Source | Link |
---|---|
zerodayinitiative | www.zerodayinitiative.com/advisories/ZDI-23-1489/ |
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
zerodayinitiative | www.zerodayinitiative.com/advisories/ZDI-CAN-19399/ |
access | www.access.redhat.com/security/cve/CVE-2023-39191 |
cve | www.cve.org/CVERecord |
nvd | www.nvd.nist.gov/vuln/detail/CVE-2023-39191 |
launchpad | www.launchpad.net/bugs/cve/CVE-2023-39191 |
security-tracker | www.security-tracker.debian.org/tracker/CVE-2023-39191 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo