{"id":"CVE-2017-1000364","details":"An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be \"jumped\" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).","modified":"2026-03-12T22:30:29.378658Z","published":"2017-06-19T16:29:00.233Z","related":["MGASA-2017-0186","MGASA-2017-0187","MGASA-2017-0188","SUSE-SU-2017:1613-1","SUSE-SU-2017:1615-1","SUSE-SU-2017:1617-1","SUSE-SU-2017:1618-1","SUSE-SU-2017:1628-1","SUSE-SU-2017:1696-1","SUSE-SU-2017:1704-1","SUSE-SU-2017:1706-1","SUSE-SU-2017:1707-1","SUSE-SU-2017:1735-1","SUSE-SU-2017:1903-1","SUSE-SU-2017:1904-1","SUSE-SU-2017:1905-1","SUSE-SU-2017:1906-1","SUSE-SU-2017:1907-1","SUSE-SU-2017:1908-1","SUSE-SU-2017:1909-1","SUSE-SU-2017:1910-1","SUSE-SU-2017:1911-1","SUSE-SU-2017:1912-1","SUSE-SU-2017:1913-1","SUSE-SU-2017:1914-1","SUSE-SU-2017:1915-1","SUSE-SU-2017:1922-1","SUSE-SU-2017:1923-1","SUSE-SU-2017:1924-1","SUSE-SU-2017:1925-1","SUSE-SU-2017:1937-1","SUSE-SU-2017:1939-1","SUSE-SU-2017:1941-1","SUSE-SU-2017:1942-1","SUSE-SU-2017:1943-1","SUSE-SU-2017:1944-1","SUSE-SU-2017:1945-1","SUSE-SU-2017:1946-1","SUSE-SU-2017:1990-1","SUSE-SU-2017:2342-1"],"references":[{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10207"},{"type":"WEB","url":"http://www.securitytracker.com/id/1038724"},{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10205"},{"type":"WEB","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/45625/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1488"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1489"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1616"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1712"},{"type":"ADVISORY","url":"https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"},{"type":"ADVISORY","url":"https://www.suse.com/security/cve/CVE-2017-1000364/"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3886"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1482"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1484"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1485"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1486"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2017-1000364"},{"type":"ADVISORY","url":"https://www.suse.com/support/kb/doc/?id=7020973"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1487"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1491"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1567"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1647"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1483"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1490"},{"type":"REPORT","url":"http://www.securityfocus.com/bid/99130"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-1000364.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.11.5"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}