Your submission was sent successfully! Close

CVE-2016-4794

Published: 23 May 2016

Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.

From the Ubuntu security team

Sasha Levin discovered that a use-after-free existed in the percpu allocator in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges.

Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
Patches:
Introduced by 9c824b6a172c8d44a6b037946bae90127c969b1b
Fixed by 4f996e234dad488e5d9ba0858bc1bae12eff82c3
Introduced by 1a4d76076cda69b0abf15463a8cebc172406da25
Fixed by 6710e594f71ccaad8101bc64321152af7cd9ea28
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.7~rc4)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support

References

Bugs