Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-1000371
HistoryJun 19, 2017 - 12:00 a.m.

CVE-2017-1000371

2017-06-1900:00:00
ubuntu.com
ubuntu.com
22

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.6%

The offset2lib patch as used by the Linux Kernel contains a vulnerability,
if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is
allocated (the maximum under the 1/4 restriction) then the stack will be
grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000
the minimum distance between the end of the PIE binary’s read-write segment
and the start of the stack becomes small enough that the stack guard page
can be jumped over by an attacker. This affects Linux Kernel version
4.11.5. This is a different issue than CVE-2017-1000370 and
CVE-2017-1000365. This issue appears to be limited to i386 based systems.

Notes

Author Note
tyhicks The original offset2lib issue was not assigned a CVE and the fix is only in 15.04 (Vivid) and newer kernels.
Rows per page:
1-10 of 111

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.6%