First published: Thu Jun 22 2017(Updated: )
It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.10.0-1008-raspi2 | <4.10.0-1008.11 | 4.10.0-1008.11 |
=17.04 | ||
All of | ||
ubuntu/linux-image-raspi2 | <4.10.0.1008.10 | 4.10.0.1008.10 |
=17.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is CVE-2017-1000364.
This vulnerability allows an attacker to execute arbitrary code and gain administrative privileges.
The affected software is Linux kernel versions 4.10.0-1008.11 and 4.10.0.1008.10 on Ubuntu 17.04.
To fix this vulnerability, update your system to Linux kernel versions 4.10.0-1008.11 or 4.10.0.1008.10.
You can find more information about this vulnerability at the following links: [USN-3335-2](https://ubuntu.com/security/notices/USN-3335-2) and [USN-3331-1](https://ubuntu.com/security/notices/USN-3331-1).