First published: Thu Jun 22 2017(Updated: )
It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.8.0-1040-raspi2 | <4.8.0-1040.44 | 4.8.0-1040.44 |
=16.10 | ||
All of | ||
ubuntu/linux-image-raspi2 | <4.8.0.1040.44 | 4.8.0.1040.44 |
=16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-3327-1.
The title of this vulnerability is 'USN-3327-1: Linux kernel (Raspberry Pi 2) vulnerability'.
The stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap, allowing an attacker to execute arbitrary code and gain administrative privileges.
The affected software for this vulnerability is Ubuntu 16.10 with Linux kernel version 4.8.0-1040.44 (linux-image-4.8.0-1040-raspi2) and 4.8.0.1040.44 (linux-image-raspi2).
You can find more information about this vulnerability at the following references: [USN-3335-2](https://ubuntu.com/security/notices/USN-3335-2) and [USN-3331-1](https://ubuntu.com/security/notices/USN-3331-1).