RHEL 10 must disable access to the network bpf system call from nonprivileged processes.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-281335 | RHEL-10-800030 | SV-281335r1167155_rule | CCI-001082 | medium |
| Description | ||||
| Loading and accessing the packet filters programs and maps using the bpf() system call has the potential to reveal sensitive information about the kernel state. | ||||
| STIG | Date | |||
| Red Hat Enterprise Linux 10 Security Technical Implementation Guide | 2026-03-11 | |||
Details
Check Text (C-281335r1167155_chk)
Verify RHEL 10 prevents privilege escalation through the kernel by disabling access to the bpf system call.
Check the status of the "kernel.unprivileged_bpf_disabled" kernel parameter with the following command:
$ sysctl kernel.unprivileged_bpf_disabled
kernel.unprivileged_bpf_disabled = 1
If "kernel.unprivileged_bpf_disabled" is not set to "1" or is missing, this is a finding.
Fix Text (F-85801r1167154_fix)
Configure RHEL 10 to prevent privilege escalation through the kernel by disabling access to the bpf system call.
Create the drop-in file if it does not already exist:
$ sudo vi /etc/sysctl.d/99-kernel_unprivileged_bpf_disabled
Add the following line to the file:
kernel.unprivileged_bpf_disabled = 1
Reload settings from all system configuration files with the following command:
$ sudo sysctl --system