Vulnerability Details CVE-2016-4558
The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.4%
CVSS Severity
CVSS v3 Score 7.0
CVSS v2 Score 6.9
Products affected by CVE-2016-4558
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:linux:linux_kernel:4.4
-
cpe:2.3:o:linux:linux_kernel:4.4.0
-
cpe:2.3:o:linux:linux_kernel:4.4.0-96.119
-
cpe:2.3:o:linux:linux_kernel:4.4.1
-
cpe:2.3:o:linux:linux_kernel:4.4.10
-
cpe:2.3:o:linux:linux_kernel:4.4.2
-
cpe:2.3:o:linux:linux_kernel:4.4.3
-
cpe:2.3:o:linux:linux_kernel:4.4.4
-
cpe:2.3:o:linux:linux_kernel:4.4.5
-
cpe:2.3:o:linux:linux_kernel:4.4.6
-
cpe:2.3:o:linux:linux_kernel:4.4.7
-
cpe:2.3:o:linux:linux_kernel:4.4.8
-
cpe:2.3:o:linux:linux_kernel:4.4.9
-
cpe:2.3:o:linux:linux_kernel:4.5
-
cpe:2.3:o:linux:linux_kernel:4.5.0
-
cpe:2.3:o:linux:linux_kernel:4.5.1
-
cpe:2.3:o:linux:linux_kernel:4.5.2
-
cpe:2.3:o:linux:linux_kernel:4.5.3
-
cpe:2.3:o:linux:linux_kernel:4.5.4