vulnerability

Ubuntu: (Multiple Advisories) (CVE-2017-1000364): Linux kernel vulnerability

Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
Jun 19, 2017
Added
Jun 20, 2017
Modified
Mar 27, 2026

Description

An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).

Solutions

ubuntu-upgrade-linux-image-3-13-0-121-genericubuntu-upgrade-linux-image-3-13-0-121-generic-lpaeubuntu-upgrade-linux-image-3-13-0-121-lowlatencyubuntu-upgrade-linux-image-3-13-0-121-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-121-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-121-powerpc-smpubuntu-upgrade-linux-image-3-13-0-121-powerpc64-embubuntu-upgrade-linux-image-3-13-0-121-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-128-genericubuntu-upgrade-linux-image-3-2-0-128-generic-paeubuntu-upgrade-linux-image-3-2-0-128-highbankubuntu-upgrade-linux-image-3-2-0-128-omapubuntu-upgrade-linux-image-3-2-0-128-powerpc-smpubuntu-upgrade-linux-image-3-2-0-128-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-128-virtualubuntu-upgrade-linux-image-4-10-0-1008-raspi2ubuntu-upgrade-linux-image-4-10-0-24-genericubuntu-upgrade-linux-image-4-10-0-24-generic-lpaeubuntu-upgrade-linux-image-4-10-0-24-lowlatencyubuntu-upgrade-linux-image-4-4-0-1016-gkeubuntu-upgrade-linux-image-4-4-0-1020-awsubuntu-upgrade-linux-image-4-4-0-1059-raspi2ubuntu-upgrade-linux-image-4-4-0-1061-snapdragonubuntu-upgrade-linux-image-4-4-0-81-genericubuntu-upgrade-linux-image-4-4-0-81-generic-lpaeubuntu-upgrade-linux-image-4-4-0-81-lowlatencyubuntu-upgrade-linux-image-4-4-0-81-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-81-powerpc-smpubuntu-upgrade-linux-image-4-4-0-81-powerpc64-embubuntu-upgrade-linux-image-4-4-0-81-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1040-raspi2ubuntu-upgrade-linux-image-4-8-0-56-genericubuntu-upgrade-linux-image-4-8-0-56-generic-lpaeubuntu-upgrade-linux-image-4-8-0-56-lowlatencyubuntu-upgrade-linux-image-4-8-0-56-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-56-powerpc-smpubuntu-upgrade-linux-image-4-8-0-56-powerpc64-embubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual

References

    Title
    Rapid7 Labs

    2026 Global Threat Landscape Report

    The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.