First published: Fri Sep 15 2017(Updated: )
A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system. Upstream patch: <a href="https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86">https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS CentOS | =6.0 | |
CentOS CentOS | =6.1 | |
CentOS CentOS | =6.2 | |
CentOS CentOS | =6.3 | |
CentOS CentOS | =6.4 | |
CentOS CentOS | =6.5 | |
CentOS CentOS | =6.6 | |
CentOS CentOS | =6.7 | |
CentOS CentOS | =6.8 | |
CentOS CentOS | =6.9 | |
CentOS CentOS | =7.1406 | |
CentOS CentOS | =7.1503 | |
CentOS CentOS | =7.1511 | |
CentOS CentOS | =7.1611 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =6.1 | |
Redhat Enterprise Linux | =6.2 | |
Redhat Enterprise Linux | =6.3 | |
Redhat Enterprise Linux | =6.4 | |
Redhat Enterprise Linux | =6.5 | |
Redhat Enterprise Linux | =6.6 | |
Redhat Enterprise Linux | =6.7 | |
Redhat Enterprise Linux | =6.8 | |
Redhat Enterprise Linux | =6.9 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.1 | |
Redhat Enterprise Linux | =7.2 | |
Redhat Enterprise Linux | =7.3 | |
Linux Linux kernel | >=2.6.25<3.2.70 | |
Linux Linux kernel | >=3.3<3.4.109 | |
Linux Linux kernel | >=3.5<3.10.77 | |
Linux Linux kernel | >=3.11<3.12.43 | |
Linux Linux kernel | >=3.13<3.14.41 | |
Linux Linux kernel | >=3.15<3.16.35 | |
Linux Linux kernel | >=3.17<3.18.14 | |
Linux Linux kernel | >=3.19<3.19.7 | |
Linux Linux kernel | >=4.0<4.0.2 | |
Linux kernel |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.