ghsa-8495-qjxw-fcp2
Vulnerability from github
Published
2022-05-14 02:20
Modified
2022-05-14 02:20
Severity
Details
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
{ "affected": [], "aliases": [ "CVE-2017-1000364" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-06-19T16:29:00Z", "severity": "HIGH" }, "details": "An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be \"jumped\" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).", "id": "GHSA-8495-qjxw-fcp2", "modified": "2022-05-14T02:20:37Z", "published": "2022-05-14T02:20:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364" }, { "type": "WEB", "url": "https://www.suse.com/support/kb/doc/?id=7020973" }, { "type": "WEB", "url": "https://www.suse.com/security/cve/CVE-2017-1000364" }, { "type": "WEB", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/45625" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03800en_us" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10207" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2017-1000364" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1712" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1567" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1491" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1490" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1489" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1488" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1487" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1486" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1485" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1484" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1483" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1482" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3886" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/99130" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1038724" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading...