First published: Fri Sep 15 2017(Updated: )
A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system. Upstream patch: <a href="https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86">https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
CentOS | =6.0 | |
CentOS | =6.1 | |
CentOS | =6.2 | |
CentOS | =6.3 | |
CentOS | =6.4 | |
CentOS | =6.5 | |
CentOS | =6.6 | |
CentOS | =6.7 | |
CentOS | =6.8 | |
CentOS | =6.9 | |
CentOS | =7.1406 | |
CentOS | =7.1503 | |
CentOS | =7.1511 | |
CentOS | =7.1611 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =6.1 | |
Red Hat Enterprise Linux | =6.2 | |
Red Hat Enterprise Linux | =6.3 | |
Red Hat Enterprise Linux | =6.4 | |
Red Hat Enterprise Linux | =6.5 | |
Red Hat Enterprise Linux | =6.6 | |
Red Hat Enterprise Linux | =6.7 | |
Red Hat Enterprise Linux | =6.8 | |
Red Hat Enterprise Linux | =6.9 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =7.1 | |
Red Hat Enterprise Linux | =7.2 | |
Red Hat Enterprise Linux | =7.3 | |
Linux Kernel | >=2.6.25<3.2.70 | |
Linux Kernel | >=3.3<3.4.109 | |
Linux Kernel | >=3.5<3.10.77 | |
Linux Kernel | >=3.11<3.12.43 | |
Linux Kernel | >=3.13<3.14.41 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.18.14 | |
Linux Kernel | >=3.19<3.19.7 | |
Linux Kernel | >=4.0<4.0.2 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000253 is classified as a high-severity vulnerability due to the potential for local privilege escalation.
To fix CVE-2017-1000253, apply the latest kernel updates provided by your Linux distribution.
CVE-2017-1000253 affects various versions of the Linux kernel, particularly those in CentOS 6.x and 7.x, as well as Red Hat Enterprise Linux 6.x and 7.x.
CVE-2017-1000253 requires local access to the system for exploitation, meaning it is not a remote vulnerability.
CVE-2017-1000253 can allow attackers to gain elevated privileges, potentially compromising sensitive applications running on affected systems.