Full title: Linux Kernel < 4.14.8 Sign Extension Local Privilege Escalation Exploit Category: remote exploits Platform: linux Linux kernel versions prior to 4.14.8 utilize the Berkeley Packet Filter (BPF) which contains a vulnerability where it may improperly perform signing for an extension. This can be utilized to escalate privileges. The target system must be compiled with BPF support and must not have kernel.unprivileged_bpf_disabled set to 1. This Metasploit module has been tested successfully on many different kernels. # 0day.today @ http://0day.today/