Linux BPF Sign Extension Local Privilege Escalation
Posted by deepcore on July 19, 2018 – 11:54 pm
Linux kernel versions prior to 4.14.8 utilize the Berkeley Packet Filter (BPF) which contains a vulnerability where it may improperly perform signing for an extension. This can be utilized to escalate privileges. The target system must be compiled with BPF support and must not have kernel.unprivileged_bpf_disabled set to 1. This Metasploit module has been tested successfully on many different kernels.
Post a reply
You must be logged in to post a comment.