High severity7.8NVD Advisory· Published Feb 24, 2017· Updated May 13, 2026
CVE-2017-5669
CVE-2017-5669
Description
The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
Affected products
4cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 1 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- bugzilla.kernel.org/show_bug.cginvdIssue TrackingPatchVendor Advisory
- github.com/torvalds/linux/commit/95e91b831f87ac8e1f8ed50c14d709089b4e01b8nvdPatchThird Party Advisory
- github.com/torvalds/linux/commit/e1d35d4dc7f089e6c9c080d556feedf9c706f0c7nvdPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3804nvdThird Party Advisory
- www.securityfocus.com/bid/96754nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037918nvdThird Party AdvisoryVDB Entry
- usn.ubuntu.com/3583-1/nvdThird Party Advisory
- usn.ubuntu.com/3583-2/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.