Your submission was sent successfully! Close

CVE-2017-5546

Published: 06 February 2017

The freelist-randomization feature in mm/slab.c in the Linux kernel 4.8.x and 4.9.x before 4.9.5 allows local users to cause a denial of service (duplicate freelist entries and system crash) or possibly have unspecified other impact in opportunistic circumstances by leveraging the selection of a large value for a random number.

From the Ubuntu security team

It was discovered that the freelist-randomization in the SLAB memory allocator allowed duplicate freelist entries. A local attacker could use this to cause a denial of service (system crash).

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
Patches:
Introduced by c7ce4f60ac199fb3521c5fcd64da21cee801ec2b
Fixed by c4e490cf148e85ead0d1b1c2caaba833f1d5b29f
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-azure
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-euclid
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-gcp
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-kvm
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.10~rc4)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support

References