Oval Definition:oval:com.ubuntu.xenial:def:20164558000
Revision Date:2016-05-23Version:1
Title:CVE-2016-4558 on Ubuntu 16.04 LTS (xenial) - medium.
Description:The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count. Jann Horn discovered that the extended Berkeley Packet Filter (eBPF) implementation in the Linux kernel could overflow reference counters on systems with more than 32GB of physical ram and with RLIMIT_MEMLOCK set to infinite. A local unprivileged attacker could use to create a use-after- free situation, causing a denial of service (system crash) or possibly gain administrative privileges.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2016-4558
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • The 'linux' package in xenial was vulnerable but has been fixed (note: '4.4.0-24.43').
  • OR NOT While related to the CVE in some way, the 'linux-aws' package in xenial is not affected (note: '4.4.0-1001.10').
  • OR NOT While related to the CVE in some way, the 'linux-flo' package in xenial is not affected.
  • OR NOT While related to the CVE in some way, the 'linux-gke' package in xenial is not affected (note: '4.4.0-1003.3').
  • OR NOT While related to the CVE in some way, the 'linux-goldfish' package in xenial is not affected.
  • OR NOT While related to the CVE in some way, the 'linux-hwe' package in xenial is not affected (note: '4.8.0-36.36~16.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-hwe-edge' package in xenial is not affected (note: '4.8.0-36.36~16.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-mako' package in xenial is not affected.
  • OR The 'linux-raspi2' package in xenial was vulnerable but has been fixed (note: '4.4.0-1012.16').
  • OR The 'linux-snapdragon' package in xenial was vulnerable but has been fixed (note: '4.4.0-1015.18').
  • BACK