Bug 1462165 (CVE-2017-1000379)

Summary: CVE-2017-1000379 kernel: Incorrectly mapped contents of PIE executable
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: agordeev, aquini, bhu, blc, carnil, dhoward, esammons, fhrbata, gansalmon, hkrzesin, hwkernel-mgr, iboverma, ichavero, itamar, jforbes, jkacur, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, lwang, madhu.chinakonda, matt, mchehab, mcressma, mguzik, mlangsdo, nmurray, pholasek, plougher, pmatouse, rt-maint, rvrbovsk, security-response-team, slawomir, vdronov, williams, wmealing
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-10-05 21:32:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1462833    
Bug Blocks: 1473657    

Description Andrej Nemec 2017-06-16 10:53:43 UTC
The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack.

Comment 1 Andrej Nemec 2017-06-16 10:53:54 UTC
Acknowledgments:

Name: Qualys Inc

Comment 3 Petr Matousek 2017-06-19 16:09:06 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1462833]

Comment 4 Wade Mealing 2017-08-29 08:17:17 UTC
Statement:

This issue was part of the stack guard fixes that was fixed along side the CVE-2017-1000364 flaw.  This issue has previously affected Red Hat Enterprise Linux 5,6,7 and MRG-2.  This issue is currently fixed in most versions of shipping products.