CVE-2023-54181 — Protection Mechanism Failure in Linux
Severity
5.3MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix issue in verifying allow_ptr_leaks
After we converted the capabilities of our networking-bpf program from
cap_sys_admin to cap_net_admin+cap_bpf, our networking-bpf program
failed to start. Because it failed the bpf verifier, and the error log
is "R3 pointer comparison prohibited".
A simple reproducer as follows,
SEC("cls-ingress")
int ingress(struct __sk_buff *skb)
{
struct iphdr *iph = (void *)(long)skb->data + si…
Affected Packages4 packages
▶CVEListV5linux/linux2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366 — c96c67991aac6401b4c6996093bccb704bb2ea4b+4
🔴Vulnerability Details
3OSV▶
CVE-2023-54181: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix issue in verifying allow_ptr_leaks After we converted the capabilities of↗2025-12-30
GHSA▶
GHSA-6985-fmpm-h392: In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix issue in verifying allow_ptr_leaks
After we converted the capabilities↗2025-12-30