← Voltar para CVEs
CVE-2017-1000364
N/ADescricao
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado6/19/2017
Ultima modificacao4/20/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
linux:linux_kernel
Fraquezas (CWE)
CWE-119
Referencias
http://www.debian.org/security/2017/dsa-3886(cve@mitre.org)
http://www.securityfocus.com/bid/99130(cve@mitre.org)
http://www.securitytracker.com/id/1038724(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1482(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1483(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1484(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1485(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1486(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1487(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1488(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1489(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1490(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1491(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1567(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1616(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1647(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2017:1712(cve@mitre.org)
https://access.redhat.com/security/cve/CVE-2017-1000364(cve@mitre.org)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us(cve@mitre.org)
https://www.exploit-db.com/exploits/45625/(cve@mitre.org)
https://www.suse.com/security/cve/CVE-2017-1000364/(cve@mitre.org)
https://www.suse.com/support/kb/doc/?id=7020973(cve@mitre.org)
http://www.debian.org/security/2017/dsa-3886(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/99130(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1038724(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1482(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1483(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1484(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1485(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1486(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1487(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1488(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1489(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1490(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1491(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1567(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1616(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1647(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1712(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/CVE-2017-1000364(af854a3a-2127-422b-91ae-364da2661108)
https://kc.mcafee.com/corporate/index?page=content&id=SB10205(af854a3a-2127-422b-91ae-364da2661108)
https://kc.mcafee.com/corporate/index?page=content&id=SB10207(af854a3a-2127-422b-91ae-364da2661108)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45625/(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt(af854a3a-2127-422b-91ae-364da2661108)
https://www.suse.com/security/cve/CVE-2017-1000364/(af854a3a-2127-422b-91ae-364da2661108)
https://www.suse.com/support/kb/doc/?id=7020973(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.