CVE-2016-2383 (retired)

Priority
Description
The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel
before 4.5 does not consider the delta in the backward-jump case, which
allows local users to obtain sensitive information from kernel memory by
creating a packet filter and then loading crafted BPF instructions.
Ubuntu-Description
It was discovered that the extended Berkeley Packet Filter (eBPF)
implementation in the Linux kernel did not correctly compute branch offsets
for backward jumps after ctx expansion. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code.
Notes
 jdstrand> android kernels (flo, goldfish, grouper, maguro, mako and manta) are
  not supported on the Ubuntu Touch 14.10 and earlier preview kernels
 jdstrand> linux-lts-saucy no longer receives official support
 jdstrand> linux-lts-quantal no longer receives official support
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-11.26)
Patches:
Introduced by 9bac3d6d548e5cc925570b263f35b70a00a00ffdFixed by a1b14d27ed0965838350f1377ff97c93ee383492
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1001.10)
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1003.3)
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Product
linux-krillin:not-affected
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1004.5)
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1012.12)
Package
Upstream:released (4.5~rc4)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Product
linux-vegetahd:not-affected
More Information

Updated: 2019-09-19 15:57:27 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)