*** This bug is a security vulnerability *** Public security bug reported:
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be jumped over Break-Fix: 320b2b8de12698082609ebbc1a17165727f4c893 - ** Affects: linux (Ubuntu) Importance: High Status: New ** Affects: linux-aws (Ubuntu) Importance: High Status: Invalid ** Affects: linux-azure (Ubuntu) Importance: High Status: Invalid ** Affects: linux-flo (Ubuntu) Importance: High Status: Invalid ** Affects: linux-gke (Ubuntu) Importance: High Status: Invalid ** Affects: linux-goldfish (Ubuntu) Importance: High Status: Invalid ** Affects: linux-hwe (Ubuntu) Importance: High Status: Invalid ** Affects: linux-hwe-edge (Ubuntu) Importance: High Status: Invalid ** Affects: linux-joule (Ubuntu) Importance: High Status: Invalid ** Affects: linux-lts-utopic (Ubuntu) Importance: High Status: Invalid ** Affects: linux-lts-vivid (Ubuntu) Importance: High Status: Invalid ** Affects: linux-lts-wily (Ubuntu) Importance: High Status: Invalid ** Affects: linux-lts-xenial (Ubuntu) Importance: High Status: Invalid ** Affects: linux-mako (Ubuntu) Importance: High Status: Invalid ** Affects: linux-manta (Ubuntu) Importance: High Status: Invalid ** Affects: linux-raspi2 (Ubuntu) Importance: High Status: New ** Affects: linux-snapdragon (Ubuntu) Importance: High Status: New ** Affects: linux-ti-omap4 (Ubuntu) Importance: High Status: Invalid ** Affects: linux (Ubuntu Trusty) Importance: High Status: New ** Affects: linux-aws (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-azure (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-flo (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-gke (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-goldfish (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-hwe (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-hwe-edge (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-joule (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-lts-utopic (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-lts-vivid (Ubuntu Trusty) Importance: High Status: New ** Affects: linux-lts-wily (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-lts-xenial (Ubuntu Trusty) Importance: High Status: New ** Affects: linux-mako (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-manta (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-raspi2 (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-snapdragon (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux-ti-omap4 (Ubuntu Trusty) Importance: High Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-aws (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-azure (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-flo (Ubuntu Xenial) Importance: High Status: Invalid ** Affects: linux-gke (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-goldfish (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-hwe (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-hwe-edge (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-joule (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-lts-utopic (Ubuntu Xenial) Importance: High Status: Invalid ** Affects: linux-lts-vivid (Ubuntu Xenial) Importance: High Status: Invalid ** Affects: linux-lts-wily (Ubuntu Xenial) Importance: High Status: Invalid ** Affects: linux-lts-xenial (Ubuntu Xenial) Importance: High Status: Invalid ** Affects: linux-mako (Ubuntu Xenial) Importance: High Status: Invalid ** Affects: linux-manta (Ubuntu Xenial) Importance: High Status: Invalid ** Affects: linux-raspi2 (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-snapdragon (Ubuntu Xenial) Importance: High Status: New ** Affects: linux-ti-omap4 (Ubuntu Xenial) Importance: High Status: Invalid ** Affects: linux (Ubuntu Yakkety) Importance: High Status: New ** Affects: linux-aws (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-azure (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-flo (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-gke (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-goldfish (Ubuntu Yakkety) Importance: High Status: New ** Affects: linux-hwe (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-hwe-edge (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-joule (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-lts-utopic (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-lts-vivid (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-lts-wily (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-lts-xenial (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-mako (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-manta (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux-raspi2 (Ubuntu Yakkety) Importance: High Status: New ** Affects: linux-snapdragon (Ubuntu Yakkety) Importance: High Status: New ** Affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: High Status: Invalid ** Affects: linux (Ubuntu Zesty) Importance: High Status: New ** Affects: linux-aws (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-azure (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-flo (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-gke (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-goldfish (Ubuntu Zesty) Importance: High Status: New ** Affects: linux-hwe (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-hwe-edge (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-joule (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-lts-utopic (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-lts-vivid (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-lts-wily (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-lts-xenial (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-mako (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-manta (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux-raspi2 (Ubuntu Zesty) Importance: High Status: New ** Affects: linux-snapdragon (Ubuntu Zesty) Importance: High Status: New ** Affects: linux-ti-omap4 (Ubuntu Zesty) Importance: High Status: Invalid ** Affects: linux (Ubuntu Artful) Importance: High Status: New ** Affects: linux-aws (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-azure (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-flo (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-gke (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-goldfish (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-hwe (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-hwe-edge (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-joule (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-lts-utopic (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-lts-vivid (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-lts-wily (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-lts-xenial (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-mako (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-manta (Ubuntu Artful) Importance: High Status: Invalid ** Affects: linux-raspi2 (Ubuntu Artful) Importance: High Status: New ** Affects: linux-snapdragon (Ubuntu Artful) Importance: High Status: New ** Affects: linux-ti-omap4 (Ubuntu Artful) Importance: High Status: Invalid ** Tags: kernel-cve-tracking-bug ** Tags added: kernel-cve-tracking-bug ** Information type changed from Public to Public Security ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000364 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1698919 Title: CVE-2017-1000364 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1698919/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs