BPF recently supported a new feature, dynptr (https://lwn.net/Articles/895885). An improper input validation issue was found in dynptr, potentially leading to local privilege escalation. This flaw requires CAP_BPF to be exploited.
Upstream patch: https://lore.kernel.org/all/20230121002241.2113993-1-memxor@gmail.com/
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2242087]
ZDI security advisory: https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399
This was fixed for Fedora with the 6.2.3 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2023:6583
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:0381 https://access.redhat.com/errata/RHSA-2024:0381
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:0439 https://access.redhat.com/errata/RHSA-2024:0439
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:0448 https://access.redhat.com/errata/RHSA-2024:0448