CVE-2017-1000364

An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
References
Link Resource
http://www.debian.org/security/2017/dsa-3886
http://www.securityfocus.com/bid/99130 Issue Tracking VDB Entry
http://www.securitytracker.com/id/1038724
https://access.redhat.com/errata/RHSA-2017:1482
https://access.redhat.com/errata/RHSA-2017:1483
https://access.redhat.com/errata/RHSA-2017:1484
https://access.redhat.com/errata/RHSA-2017:1485
https://access.redhat.com/errata/RHSA-2017:1486
https://access.redhat.com/errata/RHSA-2017:1487
https://access.redhat.com/errata/RHSA-2017:1488
https://access.redhat.com/errata/RHSA-2017:1489
https://access.redhat.com/errata/RHSA-2017:1490
https://access.redhat.com/errata/RHSA-2017:1491
https://access.redhat.com/errata/RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1616
https://access.redhat.com/errata/RHSA-2017:1647
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/security/cve/CVE-2017-1000364 Third Party Advisory VDB Entry
https://kc.mcafee.com/corporate/index?page=content&id=SB10205
https://kc.mcafee.com/corporate/index?page=content&id=SB10207
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us
https://www.exploit-db.com/exploits/45625/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt Third Party Advisory
https://www.suse.com/security/cve/CVE-2017-1000364/ Third Party Advisory
https://www.suse.com/support/kb/doc/?id=7020973 Third Party Advisory
http://www.debian.org/security/2017/dsa-3886
http://www.securityfocus.com/bid/99130 Issue Tracking VDB Entry
http://www.securitytracker.com/id/1038724
https://access.redhat.com/errata/RHSA-2017:1482
https://access.redhat.com/errata/RHSA-2017:1483
https://access.redhat.com/errata/RHSA-2017:1484
https://access.redhat.com/errata/RHSA-2017:1485
https://access.redhat.com/errata/RHSA-2017:1486
https://access.redhat.com/errata/RHSA-2017:1487
https://access.redhat.com/errata/RHSA-2017:1488
https://access.redhat.com/errata/RHSA-2017:1489
https://access.redhat.com/errata/RHSA-2017:1490
https://access.redhat.com/errata/RHSA-2017:1491
https://access.redhat.com/errata/RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1616
https://access.redhat.com/errata/RHSA-2017:1647
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/security/cve/CVE-2017-1000364 Third Party Advisory VDB Entry
https://kc.mcafee.com/corporate/index?page=content&id=SB10205
https://kc.mcafee.com/corporate/index?page=content&id=SB10207
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us
https://www.exploit-db.com/exploits/45625/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt Third Party Advisory
https://www.suse.com/security/cve/CVE-2017-1000364/ Third Party Advisory
https://www.suse.com/support/kb/doc/?id=7020973 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-06-19 16:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-1000364

Mitre link : CVE-2017-1000364

CVE.ORG link : CVE-2017-1000364


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer