{"id":"CVE-2023-2163","details":"Incorrect verifier pruning in BPF in Linux Kernel \u003e=5.4 leads to unsafe\ncode paths being incorrectly marked as safe, resulting in arbitrary read/write in\nkernel memory, lateral privilege escalation, and container escape.","modified":"2026-03-14T11:58:08.769739Z","published":"2023-09-20T06:15:10.233Z","related":["ALSA-2023:7549","SUSE-SU-2023:4343-1","SUSE-SU-2023:4345-1","SUSE-SU-2023:4348-1","SUSE-SU-2023:4351-1","SUSE-SU-2023:4358-1","SUSE-SU-2023:4375-1","SUSE-SU-2023:4377-1","SUSE-SU-2023:4378-1","SUSE-SU-2023:4414-1","SUSE-SU-2023:4766-1","SUSE-SU-2023:4775-1","SUSE-SU-2023:4776-1","SUSE-SU-2023:4796-1","SUSE-SU-2023:4801-1","SUSE-SU-2023:4802-1","SUSE-SU-2023:4805-1","SUSE-SU-2023:4817-1","SUSE-SU-2023:4820-1","SUSE-SU-2023:4822-1","SUSE-SU-2023:4833-1","SUSE-SU-2023:4835-1","SUSE-SU-2023:4836-1","SUSE-SU-2023:4839-1","SUSE-SU-2023:4841-1","SUSE-SU-2023:4848-1","SUSE-SU-2023:4849-1","SUSE-SU-2023:4862-1","SUSE-SU-2023:4863-1","SUSE-SU-2023:4866-1","SUSE-SU-2023:4867-1","SUSE-SU-2023:4871-1","SUSE-SU-2023:4872-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed"},{"type":"ARTICLE","url":"https://bughunters.google.com/blog/6303226026131456/a-deep-dive-into-cve-2023-2163-how-we-found-and-fixed-an-ebpf-linux-kernel-vulnerability"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2163.json","unresolved_ranges":[{"events":[{"introduced":"5.3"},{"fixed":"5.4.242"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.179"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.109"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.1.26"}]},{"events":[{"introduced":"6.2"},{"fixed":"6.2.13"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}