Linux Kernel CONFIG_BPF_SYSCALL Local Privilege Escalation Exploit Update

This module exploits a user-after-free vulnerability in the Linux Kernel. When bpf(BPF_PROG_LOAD, ...) was invoked with a BPF program whose bytecode references a non-map file descriptor as a map file descriptor, the error handling code called fdput() twice instead of once (in __bpf_map_get() and in replace_map_fd_with_map_ptr()). If the file descriptor table of the current task is shared, this causes f_count to be decremented too much, allowing the struct file to be freed while it is still in use (use-after-free). This can be exploited to gain root privileges by an unprivileged user. This update improves how the module removes unnecessary files after an exploitation attempt.
Exploit type: 
Platform: 
Vulnerabilty ID: 
NOCVE-9999-74975
Product Version: 
2016_R1
Released Date: 
Monday, May 9, 2016 - 00:00