JVM crashes after updating to kernel with patch for Stack Guard flaw (CVE-2017-1000364)
Environment
- Red Hat Enterprise Linux 5
- Red Hat Enterprise Linux 6
- Red Hat Enterprise Linux 7
- Appears to affect all Java versions (Oracle, OpenJDK, 1.7, 1.8, etc)
Issue
- jsvc causes Java 1.8 to core dump when running Tomcat 8. This started happening in kernel version 2.6.32-696.3.2. The kernel is the only difference in my environment between it working and core dumping jsvc.
- JVM crashes after updating to kernel-3.10.0-514.21.2.el7.x86_64
- After installing the errata kernel to fix the Stack Guard flaw (CVE-2017-1000364), JVM is crashing.
- After we installed kernel-2.6.18-420.el5 various Java applications started crashing.
- Reports of JVM crashes occurring after upgrading to a kernel with the fix for stack guard flaw.
# A fatal error has been detected by the Java Runtime Environment:
#
# SIGBUS (0x7) at pc=0x00007f0d190f6ec3, pid=17221, tid=0x00007f0d2be12740
#
# Problematic frame:
# j java.lang.Object.<clinit>()V+0
Resolution
- For RHEL 7: Upgrade to
kernel-3.10.0-693.el7from Errata RHSA-2017:1842 or later. This fix is part of RHEL7.4GA and later. - For RHEL 7.3: Upgrade to
kernel-3.10.0-514.26.2.el7from Errata RHBA-2017:1674 or later. - For RHEL 7.2 : Upgrade to
kernel-3.10.0-327.55.3.el7from Errata RHBA-2017:1711 or later. - For RHEL 6.9: Upgrade to
kernel-2.6.32-696.6.3.el6from Errata RHSA-2017:1723 or later. - For RHEL 6.7 (EUS): Upgrade to
kernel-2.6.32-573.47.1.el6from Errata RHSA-2017:2760 or later. - For RHEL 6.6 (AUS): Upgrade to
kernel-2.6.32-504.63.2.el6from Errata RHSA-2017:2731 or later. - For RHEL 6.5 (AUS): Upgrade to
kernel-2.6.32-431.84.1.el6from Errata RHSA-2017:2707 or later. - For RHEL 6.4 (AUS): Upgrade to
kernel-2.6.32-358.82.1.el6from Errata RHBA-2017:2499 or later. - For RHEL 6.2 (AUS): Upgrade to
kernel-2.6.32-220.75.1.el6from Errata RHSA-2017:2732 or later. - For RHEL 5(ELS): Upgrade to
kernel-2.6.18-422.el5from Errata RHSA-2017:2412 or later.
Workaround
The current workaround is to increase the Thread stack size of the JVM (for example, -Xss2m or -Xss1280k, which defaults to 1024k). This will require you to restart the JVM.
Diagnostic Steps
Note A list of kernel packages potentially impacted by this issue is available under the Resolve tab of This content is not included. Stack Guard Page Circumvention Affecting Multiple Packages. Please note that additional kernels are affected, for example kernel-2.6.32-220.73.1.el6 from the RHEL6.2 AUS stream, or the RHEL6.8 stream kernel packages.
This list is available here for reference:
RHEL 7
- 7.3kernel-3.10.0-514.21.2.el7.x86_64
- 7.3 RT kernel-rt-3.10.0-514.26.1.rt56.442.el7.x86_64
- 7.2 EUS kernel-3.10.0-327.55.2.el7.x86_64
RHEL 6
- 6.9 kernel-2.6.32-696.3.2.el6.x86_64
- 6.7 EUS kernel-2.6.32-573.42.2.el6.x86_64
- 6.6 AUS kernel-2.6.32-504.60.2.el6.x86_64
- 6.5 AUS kernel-2.6.32-431.80.2.el6.x86_64
- 6.4 AUS kernel-2.6.32-358.79.2.el6.x86_64
- 6.2 AUS kernel-2.6.32-220.72.2.el6.x86_64
RHEL 5
- RHEL 5 ELS kernel-2.6.18-420.el5.x86_64
This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.