A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the heap/stack gap, cause controlled memory corruption on process stack or heap, and thus increase their privileges on the system. This is a tracking bug for the glibc part of the mitigation.
Acknowledgments: Name: Qualys Research Labs
External References: https://access.redhat.com/security/vulnerabilities/stackguard https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Created glibc tracking bugs for this issue: Affects: fedora-all [bug 1462820]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1481 https://access.redhat.com/errata/RHSA-2017:1481
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:1480 https://access.redhat.com/errata/RHSA-2017:1480
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Extended Lifecycle Support Red Hat Enterprise Linux 5.9 Long Life Red Hat Enterprise Linux 6.2 Advanced Update Support Red Hat Enterprise Linux 6.4 Advanced Update Support Red Hat Enterprise Linux 6.5 Advanced Update Support Red Hat Enterprise Linux 6.5 Telco Extended Update Support Red Hat Enterprise Linux 6.6 Advanced Update Support Red Hat Enterprise Linux 6.6 Telco Extended Update Support Red Hat Enterprise Linux 6.7 Extended Update Support Red Hat Enterprise Linux 7.2 Extended Update Support Via RHSA-2017:1479 https://access.redhat.com/errata/RHSA-2017:1479
This issue has been addressed in the following products: CDK 3.0 Via RHSA-2017:1567 https://access.redhat.com/errata/RHSA-2017:1567
Statement: This is a glibc-side mitigation. For a related kernel mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000364 .