{"id":"USN-3330-1","summary":"linux-snapdragon vulnerability","details":"It was discovered that the stack guard page for processes in the Linux\nkernel was not sufficiently large enough to prevent overlapping with the\nheap. An attacker could leverage this with another vulnerability to execute\narbitrary code and gain administrative privileges\n","modified":"2026-02-10T04:41:08Z","published":"2017-06-22T02:55:45Z","related":["UBUNTU-CVE-2017-1000364"],"upstream":["CVE-2017-1000364","UBUNTU-CVE-2017-1000364"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3330-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000364"}],"affected":[{"package":{"name":"linux-snapdragon","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-snapdragon@4.4.0-1061.66?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1061.66"}]}],"versions":["4.4.0-1012.12","4.4.0-1013.14","4.4.0-1013.15","4.4.0-1015.18","4.4.0-1019.22","4.4.0-1020.23","4.4.0-1022.25","4.4.0-1024.27","4.4.0-1026.29","4.4.0-1030.33","4.4.0-1032.36","4.4.0-1035.39","4.4.0-1039.43","4.4.0-1042.46","4.4.0-1044.48","4.4.0-1046.50","4.4.0-1047.51","4.4.0-1048.52","4.4.0-1050.54","4.4.0-1051.55","4.4.0-1053.57","4.4.0-1054.58","4.4.0-1055.59","4.4.0-1057.61","4.4.0-1058.62","4.4.0-1059.63"],"ecosystem_specific":{"binaries":[{"binary_version":"4.4.0-1061.66","binary_name":"linux-headers-4.4.0-1061-snapdragon"},{"binary_version":"4.4.0-1061.66","binary_name":"linux-image-4.4.0-1061-snapdragon"},{"binary_version":"4.4.0-1061.66","binary_name":"linux-snapdragon-headers-4.4.0-1061"},{"binary_version":"4.4.0-1061.66","binary_name":"linux-snapdragon-tools-4.4.0-1061"},{"binary_version":"4.4.0-1061.66","binary_name":"linux-tools-4.4.0-1061-snapdragon"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2017-1000364","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3330-1.json"}}],"schema_version":"1.7.3"}