CVE-2017-1000364
Description
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Linux kernel's 4k stack guard page can be bypassed by adjacent memory regions, allowing privilege escalation.
Vulnerability
The Linux kernel up to version 4.11.5 contains a vulnerability in the stack guard page mechanism. The guard page, introduced in 2010, is only 4 kilobytes in size. This is insufficient to prevent a "stack clash" where the stack grows into an adjacent memory region (such as the heap or another mapping). An attacker can cause controlled memory corruption by triggering stack expansion that jumps over the guard page [1]. Affected versions are Linux kernel 4.11.5 and earlier [1].
Exploitation
An attacker needs the ability to control memory allocations and manipulate the stack layout, typically through a user-space process. By allocating memory adjacent to the stack and triggering deep recursion or large stack frames, the stack can bypass the 4k guard page and collide with the adjacent region [1]. This requires no special privileges beyond user-level access. The attacker can cause controlled corruption of the stack or the adjacent memory region [1][3].
Impact
Successful exploitation allows an attacker to overwrite memory on the process stack or an adjacent memory region, leading to arbitrary code execution. This can be used to escalate privileges from user to root or to crash the system [1][3][4]. The privilege level achieved is typically root or kernel-level access, depending on the targeted process [1][3].
Mitigation
Red Hat issued updates for Red Hat Enterprise Linux 6 and 7 that increase the stack guard gap size from one page (4k) to 1 MiB, making exploitation more difficult [2][3][4]. The fix was released in kernel version 3.10.0-514.21.2.el7 for RHEL 7 [2] and in corresponding updates for RHEL 6 [3][4]. Users should apply these kernel updates and reboot the system [3]. For other Linux distributions, mitigation may require updating to a kernel version with an increased guard gap. No workaround is available without a kernel update.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
127- osv-coords127 versionspkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-bigsmp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-rt_trace&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_11&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_11&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_12&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_12&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_13&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_13&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_14&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_14&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_16&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_17&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_8&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_8&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_9&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_9&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_8&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012
< 3.0.101-104.2+ 126 more
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.12.61-52.77.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.12.61-52.77.1
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 3.0.101-104.7
- (no CPE)range: < 4.4.59-92.20.3
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 4.4.74-7.10.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 4.4.74-7.10.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.12.61-52.77.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.12.61-52.77.1
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 4.4.74-7.10.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.12.61-52.77.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.12.61-52.77.1
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 4.4.59-92.20.2
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 4.4.74-7.10.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-0.47.102.1
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 3.12.61-52.77.1
- (no CPE)range: < 3.0.101-104.2
- (no CPE)range: < 3.12.61-52.77.1
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 3.12.74-60.64.45.1
- (no CPE)range: < 7-3.1
- (no CPE)range: < 7-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 5-3.1
- (no CPE)range: < 5-3.1
- (no CPE)range: < 4-3.1
- (no CPE)range: < 4-3.1
- (no CPE)range: < 3-3.1
- (no CPE)range: < 3-3.1
- (no CPE)range: < 2-3.1
- (no CPE)range: < 2-3.1
- (no CPE)range: < 1-4.1
- (no CPE)range: < 1-4.1
- (no CPE)range: < 1-4.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 9-3.1
- (no CPE)range: < 9-3.1
- (no CPE)range: < 8-3.1
- (no CPE)range: < 8-3.1
- (no CPE)range: < 7-21.1
- (no CPE)range: < 7-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 4-3.1
- (no CPE)range: < 3-3.1
- (no CPE)range: < 2-3.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.3
- (no CPE)range: < 7-3.1
- (no CPE)range: < 7-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 6-3.1
- (no CPE)range: < 5-3.1
- (no CPE)range: < 5-3.1
- (no CPE)range: < 3-3.1
- (no CPE)range: < 3-3.1
- (no CPE)range: < 2-3.1
- (no CPE)range: < 2-3.1
- (no CPE)range: < 1-4.1
- (no CPE)range: < 1-4.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
25- access.redhat.com/security/cve/CVE-2017-1000364nvdThird Party AdvisoryVDB Entry
- www.qualys.com/2017/06/19/stack-clash/stack-clash.txtnvdThird Party Advisory
- www.suse.com/security/cve/CVE-2017-1000364/nvdThird Party Advisory
- www.suse.com/support/kb/doc/nvdThird Party Advisory
- www.securityfocus.com/bid/99130nvdIssue TrackingVDB Entry
- www.debian.org/security/2017/dsa-3886nvd
- www.securitytracker.com/id/1038724nvd
- access.redhat.com/errata/RHSA-2017:1482nvd
- access.redhat.com/errata/RHSA-2017:1483nvd
- access.redhat.com/errata/RHSA-2017:1484nvd
- access.redhat.com/errata/RHSA-2017:1485nvd
- access.redhat.com/errata/RHSA-2017:1486nvd
- access.redhat.com/errata/RHSA-2017:1487nvd
- access.redhat.com/errata/RHSA-2017:1488nvd
- access.redhat.com/errata/RHSA-2017:1489nvd
- access.redhat.com/errata/RHSA-2017:1490nvd
- access.redhat.com/errata/RHSA-2017:1491nvd
- access.redhat.com/errata/RHSA-2017:1567nvd
- access.redhat.com/errata/RHSA-2017:1616nvd
- access.redhat.com/errata/RHSA-2017:1647nvd
- access.redhat.com/errata/RHSA-2017:1712nvd
- kc.mcafee.com/corporate/indexnvd
- kc.mcafee.com/corporate/indexnvd
- support.hpe.com/hpsc/doc/public/displaynvd
- www.exploit-db.com/exploits/45625/nvd
News mentions
0No linked articles in our index yet.