The replacemapfdwithmap_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
[
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"229402017321523538640360314221805506288",
"144456764026775948473217442647286268041",
"198910655542278505564643933797678856343",
"7980845721110497768601866965190981434"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "kernel/bpf/verifier.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7",
"id": "CVE-2016-4557-504ce5e1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 1702.0,
"function_hash": "48336777566876507996516516986403235194"
},
"signature_version": "v1",
"target": {
"function": "replace_map_fd_with_map_ptr",
"file": "kernel/bpf/verifier.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7",
"id": "CVE-2016-4557-7e5edefa",
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4557.json"