- Home
- CVEs with metasploit.description==Linux kernel 4.4 < 4.5.5 extended Berkeley Packet Filter (eBPF) does not properly reference count file descriptors, resulting in a use-after-free, which can be abused to escalate privileges. The target system must be compiled with `CONFIG_BPF_SYSCALL` and must not have `kernel.unprivileged_bpf_disabled` set to 1. This module has been tested successfully on: Ubuntu 16.04 (x64) kernel 4.4.0-21-generic (default kernel); Ubuntu 16.04 (x64) kernel 4.4.0-38-generic; Ubuntu 16.04 (x64) kernel 4.4.0-42-generic; Ubuntu 16.04 (x64) kernel 4.4.0-98-generic; Ubuntu 16.04 (x64) kernel 4.4.0-140-generic.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top