On September 26, 2017, news about the Linux kernel vulnerability (CVE-2017-1000253) was released in the OSS-SEC email group. This vulnerability allows for local elevation of privilege and brings security risks. The affected Linux publishers have released updates against this vulnerability.
See the following for more information about the vulnerability.
Linux PIE/stack corruption vulnerability
In a Linux environment, if the
-pie option is used to compile an application, then the
load_elf_binary() function allocates a memory block to the application, but the
load_elf_ binary() function does not ensure sufficient space for the application. As a result, the
PT_LOAD segment exceeds
mm->mmap_base. In an x86_64 environment, if memory overflow exceeds 128 MB, the program stack is overwritten, which may lead to elevation of privilege.
Condition and method of exploitation
Local elevation of privilege
- All CentOS 7 versions released before September 13, 2017 (prior to release 1708)
- All Red Hat Enterprise Linux 7 versions released before August 1, 2017 (prior to release 7.4)
- All CentOS 6 and Red Hat Enterprise Linux 6 versions
Development personnel check whether the Linux kernel version in use is affected by this vulnerability.
How to fix or mitigate
Large vendors have released latest Linux kernel patches. We recommend that you upgrade the Linux kernel to Kernel 3.10.0-693 or later.
Note: Before upgrading the Linux kernel, back up data by using snapshots or remote backup to prevent data loss in case of exceptions during the upgrade.