First published: Wed Jun 21 2017(Updated: )
It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges (CVE-2017-1000364) Jesse Hertz and Tim Newsham discovered that the Linux netfilter implementation did not correctly perform validation when handling 32 bit compatibility IPT_SO_SET_REPLACE events on 64 bit platforms. A local unprivileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code with administrative privileges. (CVE-2016-4997)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-powerpc-smp | <3.2.0.128.142 | 3.2.0.128.142 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-128-virtual | <3.2.0-128.173 | 3.2.0-128.173 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-128-generic-pae | <3.2.0-128.173 | 3.2.0-128.173 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic | <3.2.0.128.142 | 3.2.0.128.142 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-pae | <3.2.0.128.142 | 3.2.0.128.142 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-highbank | <3.2.0.128.142 | 3.2.0.128.142 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-128-generic | <3.2.0-128.173 | 3.2.0-128.173 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-128-powerpc-smp | <3.2.0-128.173 | 3.2.0-128.173 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-virtual | <3.2.0.128.142 | 3.2.0.128.142 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-powerpc64-smp | <3.2.0.128.142 | 3.2.0.128.142 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-128-omap | <3.2.0-128.173 | 3.2.0-128.173 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-128-powerpc64-smp | <3.2.0-128.173 | 3.2.0-128.173 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-omap | <3.2.0.128.142 | 3.2.0.128.142 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-128-highbank | <3.2.0-128.173 | 3.2.0-128.173 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is CVE-2017-1000364.
The severity of the CVE-2017-1000364 vulnerability is not mentioned in the advisory.
Versions 12.04 of Ubuntu are affected by this vulnerability.
To fix the CVE-2017-1000364 vulnerability, you need to update your Linux kernel to version 3.2.0.128.142 or later.
You can find more information about this vulnerability on the Ubuntu Security Notices website.