High severity7.8NVD Advisory· Published May 23, 2016· Updated May 6, 2026
CVE-2016-4557
CVE-2016-4557
Description
The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.htmlnvdMailing ListThird Party Advisory
- www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5nvdVendor Advisory
- www.openwall.com/lists/oss-security/2016/05/06/4nvdMailing ListThird Party Advisory
- bugs.chromium.org/p/project-zero/issues/detailnvdThird Party Advisory
- bugs.debian.org/823603nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- github.com/torvalds/linux/commit/8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7nvdVendor Advisory
- www.exploit-db.com/exploits/40759/nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.