CVE-2017-17053 PUBLISHED

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

EPSS 0.11% · 29.0th percentile

Risk Scores

EPSS Score
0.11%
29.0th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSlinux-realtime0, 5.15.0-1032.35
Ubuntu:22.04:LTSlinux-intel-iot-realtime0, 5.15.0-1073.75
Ubuntu:16.04:LTSlinux-gcp4.10.0-1004.4, 4.10.0-1007.7, 4.10.0-1006.6
Ubuntu:22.04:LTSlinux-riscv5.13.0-1010.11+22.04.1, 5.15.0-1028.32, 5.15.0-1027.31
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:16.04:LTSlinux-hwe4.10.0-40.44~16.04.1, 4.10.0-42.46~16.04.1, 4.13.0-26.29~16.04.2
Ubuntu:20.04:LTSlinux-gke5.4.0-1090.97, 0, 5.4.0-1033.35
Ubuntu:20.04:LTSlinux-raspi25.4.0-1006.6, 0, 5.3.0-1007.8
Ubuntu:20.04:LTSlinux-riscv0, 5.4.0-24.28, 5.4.0-26.30
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1072.75+cvm1.1, 5.4.0-1098.104+cvm1.1, 5.4.0-1100.106+cvm1.1
Ubuntu:16.04:LTSlinux-azure4.11.0-1009.9, 4.11.0-1011.11, 4.11.0-1013.13

Timeline

References

Open in Interactive Console →