CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
26.7%
The offset2lib patch as used by the Linux Kernel contains a vulnerability,
if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is
allocated (the maximum under the 1/4 restriction) then the stack will be
grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000
the minimum distance between the end of the PIE binary’s read-write segment
and the start of the stack becomes small enough that the stack guard page
can be jumped over by an attacker. This affects Linux Kernel version
4.11.5. This is a different issue than CVE-2017-1000370 and
CVE-2017-1000365. This issue appears to be limited to i386 based systems.
Author | Note |
---|---|
tyhicks | The original offset2lib issue was not assigned a CVE and the fix is only in 15.04 (Vivid) and newer kernels. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | linux | < 4.4.0-93.116 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1032.41 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-gcp | < 4.13.0-1002.5 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-gke | < 4.4.0-1028.28 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | < 4.13.0-26.29~16.04.2 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe-edge | < 4.13.0-26.29~16.04.2 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-kvm | < 4.4.0-1007.12 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | < 4.4.0-93.116~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-raspi2 | < 4.4.0-1071.79 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-snapdragon | < 4.4.0-1073.78 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
26.7%