Red Hat Bugzilla – Bug 1462158
CVE-2017-1000371 kernel: offset2lib allows for the stack guard page to be jumped over
Last modified: 2018-08-28 18:18:28 EDT
The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIMIT_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. Upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eab09532d40090698b05a07c1c87f39fdbc5fab5
Acknowledgments: Name: Qualys Inc
External References: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1462829]
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and realtime kernels. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6. Future Linux kernel updates for the respective releases may address this issue.