CVE-2023-54181
BPF Verifier Pointer Comparison Flaw in Linux Kernel
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's BPF (Berkeley Packet Filter) verifier incorrectly handling pointer comparisons in networking BPF programs. Specifically, the verifier prohibited comparing two packet pointers, resulting in a failure to start the networking-bpf program with an error "R3 pointer comparison prohibited." The issue was that such pointer comparisons were mistakenly treated as pointer leaks, which they are not. The fix involved correcting the verifier to allow these pointer comparisons, resolving the problem.
How can this vulnerability impact me? :
This vulnerability can cause networking BPF programs that rely on pointer comparisons to fail to start because the BPF verifier incorrectly blocks these comparisons. This can lead to disruptions in network packet processing or filtering functionalities that depend on such BPF programs, potentially affecting network performance or behavior.