The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4558.json"
[
{
"events": [
{
"introduced": "4.4"
},
{
"fixed": "4.4.11"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.5.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
}
]