An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2017-1000364 - High Severity Vulnerability
Vulnerable Libraries - linuxlinux-4.1.18, linuxlinux-4.1.18, linuxlinux-4.1.18, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linux-stable-rtv4.1, linuxlinux-4.1.18, linuxlinux-4.1.18
Vulnerability Details
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
Publish Date: 2017-06-19
URL: CVE-2017-1000364
CVSS 3 Score Details (7.4)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2017-1000364
Release Date: 2017-06-19
Fix Resolution: v3.2.90,v3.16.45,v3.18.58,v4.1.42,v4.4.74,v4.9.34,v4.11.7,v4.12-rc6
Step up your Open Source Security Game with Mend here