An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
References
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3886 - | |
References | () http://www.securityfocus.com/bid/99130 - Issue Tracking, VDB Entry | |
References | () http://www.securitytracker.com/id/1038724 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1482 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1483 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1484 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1485 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1486 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1487 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1488 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1489 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1490 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1491 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1567 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1616 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1647 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1712 - | |
References | () https://access.redhat.com/security/cve/CVE-2017-1000364 - Third Party Advisory, VDB Entry | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10205 - | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10207 - | |
References | () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us - | |
References | () https://www.exploit-db.com/exploits/45625/ - | |
References | () https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt - Third Party Advisory | |
References | () https://www.suse.com/security/cve/CVE-2017-1000364/ - Third Party Advisory | |
References | () https://www.suse.com/support/kb/doc/?id=7020973 - Third Party Advisory |
Information
Published : 2017-06-19 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-1000364
Mitre link : CVE-2017-1000364
CVE.ORG link : CVE-2017-1000364
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer