CVE-2017-1000255
Published: 9 October 2017
On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.
From the Ubuntu Security Team
It was discovered that on the PowerPC architecture, the kernel did not properly sanitize the signal stack when handling sigreturn(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Notes
Author | Note |
---|---|
sbeattie | introduced in v4.9 cycle, PPC on power8 only |
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
artful |
Released
(4.13.0-17.20)
|
trusty |
Not vulnerable
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
|
|
zesty |
Released
(4.10.0-37.41)
|
|
Patches: Introduced by 5d176f751ee3c6eededd984ad409bff201f436a7 Introduced by 5d176f751ee3c6eededd984ad409bff201f436a7 |
||
linux-armadaxp Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-aws Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Not vulnerable
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
|
|
zesty |
Does not exist
|
|
linux-azure Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Not vulnerable
(4.15.0-1023.24~14.04.1)
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
(ppc only)
|
|
zesty |
Does not exist
|
|
linux-euclid Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
|
|
zesty |
Does not exist
|
|
linux-flo Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Ignored
(abandoned)
|
|
zesty |
Does not exist
|
|
linux-gcp Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
(ppc only)
|
|
zesty |
Does not exist
|
|
linux-gke Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
|
|
zesty |
Does not exist
|
|
linux-goldfish Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
|
|
zesty |
Not vulnerable
|
|
linux-grouper Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-hwe Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Released
(4.10.0-37.41~16.04.1)
|
|
zesty |
Does not exist
|
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Released
(4.10.0-37.41~16.04.1)
|
|
zesty |
Does not exist
|
|
linux-kvm Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
|
|
zesty |
Does not exist
|
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-raring Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-trusty Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was not-affected)
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-lts-wily Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Not vulnerable
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-maguro Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-mako Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Ignored
(abandoned)
|
|
zesty |
Does not exist
|
|
linux-manta Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-oem Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
(4.13.0-1008.9)
|
|
zesty |
Does not exist
|
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
linux-raspi2 Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(ppc only)
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
(ppc only)
|
|
zesty |
Not vulnerable
(ppc only)
|
|
linux-snapdragon Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(ppc only)
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Not vulnerable
(ppc only)
|
|
zesty |
Not vulnerable
(ppc only)
|
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.14~rc5)
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |