*** This bug is a security vulnerability ***
Public security bug reported:
An issue was discovered in the size of the stack guard page on Linux,
specifically a 4k stack guard page is not sufficiently large and can be
jumped over
Break-Fix: 320b2b8de12698082609ebbc1a17165727f4c893 -
** Affects: linux (Ubuntu)
Importance: High
Status: New
** Affects: linux-aws (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-azure (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-flo (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-gke (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-goldfish (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-hwe (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-hwe-edge (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-joule (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-lts-wily (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-mako (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-manta (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-raspi2 (Ubuntu)
Importance: High
Status: New
** Affects: linux-snapdragon (Ubuntu)
Importance: High
Status: New
** Affects: linux-ti-omap4 (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux (Ubuntu Trusty)
Importance: High
Status: New
** Affects: linux-aws (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-azure (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-flo (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-gke (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-goldfish (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-hwe (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-hwe-edge (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-joule (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu Trusty)
Importance: High
Status: New
** Affects: linux-lts-wily (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu Trusty)
Importance: High
Status: New
** Affects: linux-mako (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-manta (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-raspi2 (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-snapdragon (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Trusty)
Importance: High
Status: Invalid
** Affects: linux (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-aws (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-azure (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-flo (Ubuntu Xenial)
Importance: High
Status: Invalid
** Affects: linux-gke (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-goldfish (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-hwe (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-hwe-edge (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-joule (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-lts-utopic (Ubuntu Xenial)
Importance: High
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu Xenial)
Importance: High
Status: Invalid
** Affects: linux-lts-wily (Ubuntu Xenial)
Importance: High
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu Xenial)
Importance: High
Status: Invalid
** Affects: linux-mako (Ubuntu Xenial)
Importance: High
Status: Invalid
** Affects: linux-manta (Ubuntu Xenial)
Importance: High
Status: Invalid
** Affects: linux-raspi2 (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-snapdragon (Ubuntu Xenial)
Importance: High
Status: New
** Affects: linux-ti-omap4 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Affects: linux (Ubuntu Yakkety)
Importance: High
Status: New
** Affects: linux-aws (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-azure (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-flo (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-gke (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-goldfish (Ubuntu Yakkety)
Importance: High
Status: New
** Affects: linux-hwe (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-hwe-edge (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-joule (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-lts-wily (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-mako (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-manta (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux-raspi2 (Ubuntu Yakkety)
Importance: High
Status: New
** Affects: linux-snapdragon (Ubuntu Yakkety)
Importance: High
Status: New
** Affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Affects: linux (Ubuntu Zesty)
Importance: High
Status: New
** Affects: linux-aws (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-azure (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-flo (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-gke (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-goldfish (Ubuntu Zesty)
Importance: High
Status: New
** Affects: linux-hwe (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-hwe-edge (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-joule (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-lts-wily (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-mako (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-manta (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux-raspi2 (Ubuntu Zesty)
Importance: High
Status: New
** Affects: linux-snapdragon (Ubuntu Zesty)
Importance: High
Status: New
** Affects: linux-ti-omap4 (Ubuntu Zesty)
Importance: High
Status: Invalid
** Affects: linux (Ubuntu Artful)
Importance: High
Status: New
** Affects: linux-aws (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-azure (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-flo (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-gke (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-goldfish (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-hwe (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-hwe-edge (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-joule (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-lts-wily (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-mako (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-manta (Ubuntu Artful)
Importance: High
Status: Invalid
** Affects: linux-raspi2 (Ubuntu Artful)
Importance: High
Status: New
** Affects: linux-snapdragon (Ubuntu Artful)
Importance: High
Status: New
** Affects: linux-ti-omap4 (Ubuntu Artful)
Importance: High
Status: Invalid
** Tags: kernel-cve-tracking-bug
** Tags added: kernel-cve-tracking-bug
** Information type changed from Public to Public Security
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000364
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1698919
Title:
CVE-2017-1000364
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1698919/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs