mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-12-13 23:37:08 +00:00
83 lines
2.4 KiB
JSON
83 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
|
"ID" : "CVE-2017-1000364",
|
|
"REQUESTER" : "qsa@qualys.com",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Linux Kernel",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "4.11.5"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "Linux Kernel"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be \"jumped\" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010)."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "A specific CWE doesn't exist, listing as unknown for now"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"url" : "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
|
|
},
|
|
{
|
|
"url" : "https://access.redhat.com/security/cve/CVE-2017-1000364"
|
|
},
|
|
{
|
|
"url" : "https://www.suse.com/security/cve/CVE-2017-1000364/"
|
|
},
|
|
{
|
|
"url" : "https://www.suse.com/support/kb/doc/?id=7020973"
|
|
},
|
|
{
|
|
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
|
|
},
|
|
{
|
|
"url" : "http://www.debian.org/security/2017/dsa-3886"
|
|
},
|
|
{
|
|
"url" : "http://www.securityfocus.com/bid/99130"
|
|
},
|
|
{
|
|
"url" : "http://www.securitytracker.com/id/1038724"
|
|
}
|
|
]
|
|
}
|
|
}
|