Skip to content

Linux Active Exploitation Vulnerability - 20251105001

Overview

A vulnerability exists in Linux Kernel that involves incorrect pruning logic in the BPF (Berkeley Packet Filter) verifier, which incorrectly marks unsafe code paths as safe. This flaw allows threat actor to perform arbitrary read/write operations in kernel memory, leading to lateral privilege escalation and potentially container escape.

What is vulnerable?

Product(s) Affected Version(s) CVE CVSS Severity
Linux Kernel 5.3 prior to 5.4.242
5.5 prior to 5.10.179
5.11 prior to 5.15.109
5.16 prior to 6.1.26
6.2 prior to 6.2.13
CVE-2023-2163 10 Critical

What has been observed?

The WA SOC has not received any reports of exploitation of this vulnerability on Western Australian Government networks at the time of writing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframes (refer Patch Management):

Additional References