First published: Thu Jun 22 2017(Updated: )
It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-powerpc-smp | <4.8.0.56.69 | 4.8.0.56.69 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc-e500mc | <4.8.0.56.69 | 4.8.0.56.69 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-56-powerpc-smp | <4.8.0-56.61 | 4.8.0-56.61 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-56-powerpc-e500mc | <4.8.0-56.61 | 4.8.0-56.61 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-56-lowlatency | <4.8.0-56.61 | 4.8.0-56.61 |
=16.10 | ||
All of | ||
ubuntu/linux-image-generic | <4.8.0.56.69 | 4.8.0.56.69 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-56-generic | <4.8.0-56.61 | 4.8.0-56.61 |
=16.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.8.0.56.69 | 4.8.0.56.69 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-56-generic-lpae | <4.8.0-56.61 | 4.8.0-56.61 |
=16.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <4.8.0.56.69 | 4.8.0.56.69 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc64-emb | <4.8.0.56.69 | 4.8.0.56.69 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-56-powerpc64-emb | <4.8.0-56.61 | 4.8.0-56.61 |
=16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3326-1 is high.
The vulnerability occurs because the stack guard page for processes in the Linux kernel is not sufficiently large enough to prevent overlapping with the heap.
An attacker can leverage this vulnerability with another vulnerability to execute arbitrary code and gain administrative privileges.
Ubuntu version 16.10 is affected by this vulnerability.
To fix the vulnerability, update your Ubuntu system to the specified versions of the Linux kernel packages mentioned in the Ubuntu Security Notice.