Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.
[
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"203147399952754741585385886525585784247",
"111212338741524508365562463300084758055",
"103059110202758121483732213272412835021",
"337858305376286197180432018516772506214"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "kernel/bpf/verifier.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@71b547f561247897a0a14f3082730156c0533fed",
"id": "CVE-2023-2163-5721d99b",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 2431.0,
"function_hash": "301195452530728476755108210722920708890"
},
"signature_version": "v1",
"target": {
"function": "backtrack_insn",
"file": "kernel/bpf/verifier.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@71b547f561247897a0a14f3082730156c0533fed",
"id": "CVE-2023-2163-f1d5616b",
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2163.json"