In the Linux kernel, the following vulnerability has been resolved: media:
rc: bpf attach/detach requires write permission Note that bpf attach/detach
also requires CAP_NET_ADMIN.
Author | Note |
---|---|
Priority reason: Exploitation requires using eBPF, which is a privileged operation by default on Ubuntu kernels. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-106.116 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1061.67 | UNKNOWN |
git.kernel.org/linus/6a9d552483d50953320b9d3b57abdee8d436f23f (6.8-rc5)
git.kernel.org/stable/c/6a9d552483d50953320b9d3b57abdee8d436f23f
git.kernel.org/stable/c/93136132d1b5792bf44151e3494ae3691cd738e8
git.kernel.org/stable/c/93d8109bf182510629bbefc8cd45296d2393987f
git.kernel.org/stable/c/9f6087851ec6dce5b15f694aeaf3e8ec8243224e
git.kernel.org/stable/c/caf2da1d4562de4e35eedec0be2b7f1ee25d83be
git.kernel.org/stable/c/d98210108e7b2ff64b332b0a3541c8ad6a0617b0
launchpad.net/bugs/cve/CVE-2023-52642
nvd.nist.gov/vuln/detail/CVE-2023-52642
security-tracker.debian.org/tracker/CVE-2023-52642
ubuntu.com/security/notices/USN-6766-1
ubuntu.com/security/notices/USN-6766-2
ubuntu.com/security/notices/USN-6766-3
ubuntu.com/security/notices/USN-6795-1
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2023-52642