Vulnerability Description
An issue was discovered in the size of the default stack guard page on PAX Linux (originally from GRSecurity but shipped by other Linux vendors), specifically the default stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects PAX Linux Kernel versions as of June 19, 2017 (specific version information is not available at this time).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99129Third Party AdvisoryVDB Entry
- https://access.redhat.com/security/cve/CVE-2017-1000377Broken Link
- https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txtThird Party Advisory
- http://www.securityfocus.com/bid/99129Third Party AdvisoryVDB Entry
- https://access.redhat.com/security/cve/CVE-2017-1000377Broken Link
- https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txtThird Party Advisory
FAQ
What is CVE-2017-1000377?
CVE-2017-1000377 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An issue was discovered in the size of the default stack guard page on PAX Linux (originally from GRSecurity but shipped by other Linux vendors), specifically the default stack guard page is not suffi...
How severe is CVE-2017-1000377?
CVE-2017-1000377 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000377?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.