CVE-2017-5669

Published: 24 February 2017

The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.

From the Ubuntu security team

Gareth Evans discovered that the shm IPC subsystem in the Linux kernel did not properly restrict mapping page zero. A local privileged attacker could use this to execute arbitrary code.

Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 95e91b831f87ac8e1f8ed50c14d709089b4e01b8
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-azure
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-euclid
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-gcp
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-kvm
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-oem
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.11~rc1)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
tyhicks
See References for a link to the fix in the linux-next tree. As of
2017-02-27, I don't see the fix in Linus' tree.

References

Bugs