Linux Active Exploitation Vulnerability - 20251105001¶
Overview¶
A vulnerability exists in Linux Kernel that involves incorrect pruning logic in the BPF (Berkeley Packet Filter) verifier, which incorrectly marks unsafe code paths as safe. This flaw allows threat actor to perform arbitrary read/write operations in kernel memory, leading to lateral privilege escalation and potentially container escape.
What is vulnerable?¶
| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
|---|---|---|---|---|
| Linux Kernel | 5.3 prior to 5.4.242 5.5 prior to 5.10.179 5.11 prior to 5.15.109 5.16 prior to 6.1.26 6.2 prior to 6.2.13 |
CVE-2023-2163 | 10 | Critical |
What has been observed?¶
The WA SOC has not received any reports of exploitation of this vulnerability on Western Australian Government networks at the time of writing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframes (refer Patch Management):
- Linux kernel: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed