Loading and accessing the packet filters programs and maps using the bpf() system call has the potential to reveal sensitive information about the kernel state.
Check
Verify RHEL 10 prevents privilege escalation through the kernel by disabling access to the bpf system call.
Check the status of the "kernel.unprivileged_bpf_disabled" kernel parameter with the following command: