Linux distributions that have not patched their long-term kernels with git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat enterprise linux 7.0 |
||
redhat enterprise linux 6.0 |
||
redhat enterprise linux 7.2 |
||
redhat enterprise linux 7.1 |
||
redhat enterprise linux 6.7 |
||
redhat enterprise linux 7.3 |
||
centos centos 6.0 |
||
centos centos 6.1 |
||
centos centos 6.2 |
||
centos centos 6.3 |
||
centos centos 6.4 |
||
centos centos 6.5 |
||
centos centos 6.6 |
||
centos centos 6.7 |
||
centos centos 6.8 |
||
centos centos 6.9 |
||
centos centos 7.1611 |
||
centos centos 7.1511 |
||
centos centos 7.1503 |
||
centos centos 7.1406 |
||
redhat enterprise linux 6.1 |
||
redhat enterprise linux 6.2 |
||
redhat enterprise linux 6.3 |
||
redhat enterprise linux 6.4 |
||
redhat enterprise linux 6.5 |
||
redhat enterprise linux 6.6 |
||
redhat enterprise linux 6.8 |
||
redhat enterprise linux 6.9 |
||
linux linux kernel |
Urgent security triage needed
A flaw has been found in the way the Linux kernel loads ELF files. If a malicious program is built as a Position Independent Executable (PIE), the loader can be exploited to map part of that application's data segment over the memory area reserved for its stack. This can result in memory corruption and possible local privilege escalation. Red Hat and Debian are among Linux distros affected by the CVE-2017-1000253 vulnerability, which was discovered by cloud security firm Qualys. Red Hat's adviso...