It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.4.0-1059.67", "binary_name": "linux-headers-4.4.0-1059-raspi2" }, { "binary_version": "4.4.0-1059.67", "binary_name": "linux-image-4.4.0-1059-raspi2" }, { "binary_version": "4.4.0-1059.67", "binary_name": "linux-image-4.4.0-1059-raspi2-dbgsym" }, { "binary_version": "4.4.0-1059.67", "binary_name": "linux-raspi2-headers-4.4.0-1059" }, { "binary_version": "4.4.0-1059.67", "binary_name": "linux-raspi2-tools-4.4.0-1059" }, { "binary_version": "4.4.0-1059.67", "binary_name": "linux-raspi2-tools-4.4.0-1059-dbgsym" }, { "binary_version": "4.4.0-1059.67", "binary_name": "linux-tools-4.4.0-1059-raspi2" } ] }