CVE-2017-1000253

Priority
Description
Linux distributions that have not patched their long-term kernels with
https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86
(committed on April 14, 2015). This kernel vulnerability was fixed in April
2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to
Linux 3.10.77 in May 2015), but it was not recognized as a security threat.
With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down
address allocation strategy, load_elf_binary() will attempt to map a PIE
binary into an address range immediately below mm->mmap_base.
Unfortunately, load_elf_ binary() does not take account of the need to
allocate sufficient space for the entire binary which means that, while the
first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD
segment(s) end up being mapped above mm->mmap_base into the are that is
supposed to be the "gap" between the stack and the binary.
Notes
sbeattiefixed upstream in 4.1, so xenial and newer had it
went through stable, trusty had it in 3.13.0-56.93,
precise in 3.2.0-91.129, vivid in 3.19.0-19.19
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected (4.13.0-16.19)
Ubuntu 16.04 ESM:not-affected (4.2.0-16.19)
Ubuntu 14.04 ESM:released (3.13.0-57.95)
Patches:
Introduced by
cc503c1b43e002e3f1fed70f46d947e2bf349bb6
Fixed by
a87938b2e246b81b4fb713edb371a9fa3c5c3c86
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1001.1)
Ubuntu 16.04 ESM:not-affected (4.4.0-1001.10)
Ubuntu 14.04 ESM:not-affected (4.4.0-1002.2)
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.2)
Ubuntu 16.04 ESM:not-affected (4.11.0-1009.9)
Ubuntu 14.04 ESM:not-affected (4.15.0-1023.24~14.04.1)
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1001.1)
Ubuntu 16.04 ESM:not-affected (4.10.0-1004.4)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected
Ubuntu 16.04 ESM:not-affected (4.8.0-36.36~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:released (4.18.0-8.9~18.04.1)
Ubuntu 16.04 ESM:not-affected (4.8.0-36.36~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.2)
Ubuntu 16.04 ESM:not-affected (4.4.0-1004.9)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [was needs-triage now end-of-life])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:not-affected (4.4.0-13.29~14.04.1)
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.3)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected (4.13.0-1005.5)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:not-affected
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.1~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
More Information

Updated: 2022-04-13 12:51:31 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)