CVE-2016-10147
Publication date 18 January 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
From the Ubuntu Security Team
Mikulas Patocka discovered that the asynchronous multibuffer cryptographic daemon (mcryptd) in the Linux kernel did not properly handle being invoked with incompatible algorithms. A local attacker could use this to cause a denial of service (system crash).
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| linux | 18.04 LTS bionic |
Not affected
|
| linux-armadaxp | 18.04 LTS bionic | Not in release |
| linux-aws | 18.04 LTS bionic |
Not affected
|
| linux-azure | 18.04 LTS bionic |
Not affected
|
| linux-euclid | 18.04 LTS bionic | Not in release |
| linux-flo | 18.04 LTS bionic | Not in release |
| linux-gcp | 18.04 LTS bionic |
Not affected
|
| linux-gke | 18.04 LTS bionic | Not in release |
| linux-goldfish | 18.04 LTS bionic | Not in release |
| linux-grouper | 18.04 LTS bionic | Not in release |
| linux-hwe | 18.04 LTS bionic |
Not affected
|
| linux-hwe-edge | 18.04 LTS bionic |
Fixed 4.18.0-8.9~18.04.1
|
| linux-kvm | 18.04 LTS bionic |
Not affected
|
| linux-linaro-omap | 18.04 LTS bionic | Not in release |
| linux-linaro-shared | 18.04 LTS bionic | Not in release |
| linux-linaro-vexpress | 18.04 LTS bionic | Not in release |
| linux-lts-quantal | 18.04 LTS bionic | Not in release |
| linux-lts-raring | 18.04 LTS bionic | Not in release |
| linux-lts-saucy | 18.04 LTS bionic | Not in release |
| linux-lts-trusty | 18.04 LTS bionic | Not in release |
| linux-lts-utopic | 18.04 LTS bionic | Not in release |
| linux-lts-vivid | 18.04 LTS bionic | Not in release |
| linux-lts-wily | 18.04 LTS bionic | Not in release |
| linux-lts-xenial | 18.04 LTS bionic | Not in release |
| linux-maguro | 18.04 LTS bionic | Not in release |
| linux-mako | 18.04 LTS bionic | Not in release |
| linux-manta | 18.04 LTS bionic | Not in release |
| linux-oem | 18.04 LTS bionic |
Not affected
|
| linux-qcm-msm | 18.04 LTS bionic | Not in release |
| linux-raspi2 | 18.04 LTS bionic |
Not affected
|
| linux-snapdragon | 18.04 LTS bionic |
Not affected
|
| linux-ti-omap4 | 18.04 LTS bionic | Not in release |
Notes
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3190-1
- Linux kernel vulnerabilities
- 3 February 2017
- USN-3189-1
- Linux kernel vulnerabilities
- 3 February 2017
- USN-3189-2
- Linux kernel (Xenial HWE) vulnerabilities
- 3 February 2017
- USN-3190-2
- Linux kernel (Raspberry Pi 2) vulnerabilities
- 10 February 2017