Linux kernel built with the eBPF bpf(2) system call(CONFIG_BPF_SYSCALL) support
is vulnerable to an arbitrary memory r/w access issue. It could occur if a user supplied a malicious BPF program which results calculations error in eBPF verifier module.
An unprivileged user could use this flaw to escalate their privileges on a system.
# echo 1 > /proc/sys/kernel/unprivileged_bpf_disabled
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 1528517]
This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.
This was fixed in Fedora in kernel-4.14.11 which pushed to stable on January 4,
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):