First published: Thu Jun 22 2017(Updated: )
It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.10.0-24-lowlatency | <4.10.0-24.28 | 4.10.0-24.28 |
=17.04 | ||
All of | ||
ubuntu/linux-image-generic | <4.10.0.24.26 | 4.10.0.24.26 |
=17.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <4.10.0.24.26 | 4.10.0.24.26 |
=17.04 | ||
All of | ||
ubuntu/linux-image-4.10.0-24-generic-lpae | <4.10.0-24.28 | 4.10.0-24.28 |
=17.04 | ||
All of | ||
ubuntu/linux-image-4.10.0-24-generic | <4.10.0-24.28 | 4.10.0-24.28 |
=17.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.10.0.24.26 | 4.10.0.24.26 |
=17.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-3324-1.
The Linux kernel vulnerability allows an attacker to execute arbitrary code and gain administrative privileges by leveraging the insufficiently large stack guard page for processes.
Yes, there is a fix available for this Linux kernel vulnerability. Update to version 4.10.0-24.28 of the Linux kernel package or a later version to mitigate the vulnerability.
Ubuntu version 17.04 is affected by this Linux kernel vulnerability.
You can find more information about this Linux kernel vulnerability at the following references: [CVE-2017-1000364](https://ubuntu.com/security/CVE-2017-1000364), [USN-3335-2](https://ubuntu.com/security/notices/USN-3335-2), [USN-3331-1](https://ubuntu.com/security/notices/USN-3331-1).