Bug 1461333 (CVE-2017-1000364)
Summary: | CVE-2017-1000364 kernel: heap/stack gap jumping via unbounded stack allocations | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | agordeev, aquini, bhu, bmcclain, chris.reed, cperry, cshao, dblechte, dfediuck, dhoward, dhowells, dougsland, eedri, esammons, fhrbata, gansalmon, hwkernel-mgr, iboverma, ichavero, itamar, jforbes, jkacur, jonathan, jross, jwboyer, kent, kernel-maint, kernel-mgr, labbott, lgoncalv, lsurette, lwang, madhu.chinakonda, matt, mchehab, mcressma, mgoldboi, mguzik, michal.skrivanek, nmurray, pasik, pholasek, plougher, pstehlik, rbarry, rvrbovsk, security-response-team, sherold, slawomir, srevivo, vdronov, williams, ycui, ykaul, ylavi, yturgema |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-06-29 16:44:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1452722, 1452723, 1452724, 1452725, 1452726, 1452727, 1452728, 1452729, 1452730, 1452731, 1452732, 1452733, 1455397, 1458802, 1461495, 1461496, 1461497, 1461915, 1462320, 1462321, 1462354, 1462355, 1462819, 1463241, 1463823, 1464260 | ||
Bug Blocks: | 1449010 |
Description
Petr Matousek
2017-06-14 08:54:40 UTC
Acknowledgments: Name: Qualys Research Labs External References: https://access.redhat.com/security/vulnerabilities/stackguard https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1462819] This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Red Hat Enterprise Linux 6.5 Telco Extended Update Support Via RHSA-2017:1489 https://access.redhat.com/errata/RHSA-2017:1489 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.7 Extended Update Support Via RHSA-2017:1487 https://access.redhat.com/errata/RHSA-2017:1487 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.4 Advanced Update Support Via RHSA-2017:1490 https://access.redhat.com/errata/RHSA-2017:1490 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:1486 https://access.redhat.com/errata/RHSA-2017:1486 This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Extended Lifecycle Support Via RHSA-2017:1482 https://access.redhat.com/errata/RHSA-2017:1482 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Extended Update Support Via RHSA-2017:1485 https://access.redhat.com/errata/RHSA-2017:1485 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Advanced Update Support Red Hat Enterprise Linux 6.6 Telco Extended Update Support Via RHSA-2017:1488 https://access.redhat.com/errata/RHSA-2017:1488 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.2 Advanced Update Support Via RHSA-2017:1491 https://access.redhat.com/errata/RHSA-2017:1491 This issue has been addressed in the following products: Red Hat Enterprise Linux 5.9 Long Life Via RHSA-2017:1483 https://access.redhat.com/errata/RHSA-2017:1483 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1484 https://access.redhat.com/errata/RHSA-2017:1484 This issue has been addressed in the following products: CDK 3.0 Via RHSA-2017:1567 https://access.redhat.com/errata/RHSA-2017:1567 24h test run under Fedora 24 result: kernel-4.11.6-101.fc24.x86_64 *works* kernel-4.11.6-201.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report. kernel-4.11.6-301.fc26 has been pushed to the Fedora 26 stable repository. If problems still persist, please make note of it in this bug report. This fix causes bug 1464237. This is almost certainly the cause of https://bugzilla.redhat.com/show_bug.cgi?id=1464185 as well. This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:1647 https://access.redhat.com/errata/RHSA-2017:1647 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1616 Statement: This is a kernel-side mitigation. For a related glibc mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000366 . |