CVE-2017-1000371

HIGH

Linux Kernel - Memory Corruption

Title source: llm

Description

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Qualys Corporation · clocallinux_x86
https://www.exploit-db.com/exploits/42273
exploitdb WORKING POC VERIFIED
by Qualys Corporation · clocallinux_x86
https://www.exploit-db.com/exploits/42276
nomisec STUB
by Trinadh465 · poc
https://github.com/Trinadh465/linux-4.1.15_CVE-2017-1000371

Scores

CVSS v3 7.8
EPSS 0.0216
EPSS Percentile 84.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

Status published
Products (1)
linux/linux_kernel 4.1 - 4.1.43
Published Jun 19, 2017
Tracked Since Feb 18, 2026