Linux kernel built with the eBPF bpf(2) system call(CONFIG_BPF_SYSCALL) support is vulnerable to an arbitrary memory r/w access issue. It could occur if a user supplied a malicious BPF program which results calculations error in eBPF verifier module. An unprivileged user could use this flaw to escalate their privileges on a system. Upstream patch -------------- -> https://git.kernel.org/linus/3db9128fcf02dcaafa3860a69a8a55d5529b6e30 References: ----------- -> http://seclists.org/oss-sec/2017/q4/429 -> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16995 -> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995 -> https://bugs.chromium.org/p/project-zero/issues/detail?id=1454 Mitigation: ----------- # echo 1 > /proc/sys/kernel/unprivileged_bpf_disabled
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1528519]
Statement: This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.
This was fixed in Fedora as kernel-4.14.11 which pushed to stable on January 4, 2018
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-16995