Vulnerabilities > CVE-2017-1000253 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products

047910
CVSS 7.8 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
low complexity
redhat
centos
linux
CWE-119
nessus
exploit available

Summary

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

Vulnerable Configurations

Part Description Count
OS
Redhat
14
OS
Centos
14
OS
Linux
1067

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Exploit-Db

idEDB-ID:42887
last seen2018-11-30
modified2017-09-26
published2017-09-26
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/42887
titleLinux Kernel 3.10.0-514.21.2.el7.x86_64 / 3.10.0-514.26.1.el7.x86_64 (CentOS 7) - SUID Position Independent Executable 'PIE' Local Privilege Escalation

Nessus

  • NASL familyVirtuozzo Local Security Checks
    NASL idVIRTUOZZO_VZA-2017-086.NASL
    descriptionAccording to the version of the vzkernel package and the readykernel-patch installed, the Virtuozzo installation on the remote host is affected by the following vulnerabilities : - A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-10
    modified2017-11-21
    plugin id104703
    published2017-11-21
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/104703
    titleVirtuozzo 7 : readykernel-patch (VZA-2017-086)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2799.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103498
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103498
    titleRHEL 6 : kernel (RHSA-2017:2799)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2017-3658.NASL
    descriptionDescription of changes: [2.6.39-400.298.1.el6uek] - ocfs2/dlm: ignore cleaning the migration mle that is inuse (xuejiufei) [Orabug: 23320090] - tty: Fix race in pty_write() leading to NULL deref (Todd Vierling) [Orabug: 24337879] - xen-netfront: cast grant table reference first to type int (Dongli Zhang) [Orabug: 25102637] - xen-netfront: do not cast grant table reference to signed short (Dongli Zhang) [Orabug: 25102637] - RDS: Print failed rdma op details if failure is remote access error (Rama Nichanamatlu) [Orabug: 25440316] - ping: implement proper locking (Eric Dumazet) [Orabug: 26540288] {CVE-2017-2671} - KEYS: fix dereferencing NULL payload with nonzero length (Eric Biggers) [Orabug: 26592013] - oracleasm: Copy the integrity descriptor (Martin K. Petersen) [Orabug: 26650039] - mm: Tighten x86 /dev/mem with zeroing reads (Kees Cook) [Orabug: 26675934] {CVE-2017-7889} - fs: __generic_file_splice_read retry lookup on AOP_TRUNCATED_PAGE (Abhi Das) [Orabug: 26797307] - xscore: add dma address check (Zhu Yanjun) [Orabug: 27058559] - more bio_map_user_iov() leak fixes (Al Viro) [Orabug: 27069045] {CVE-2017-12190} - fix unbalanced page refcounting in bio_map_user_iov (Vitaly Mayatskikh) [Orabug: 27069045] {CVE-2017-12190} - xsigo: [backport] Fix race in freeing aged Forwarding tables (Pradeep Gopanapalli) [Orabug: 24823234] - ocfs2: fix deadlock issue when taking inode lock at vfs entry points (Eric Ren) [Orabug: 25671723] - ocfs2/dlmglue: prepare tracking logic to avoid recursive cluster lock (Eric Ren) [Orabug: 25671723] - net/packet: fix overflow in check for tp_reserve (Andrey Konovalov) [Orabug: 26143563] {CVE-2017-7308} - net/packet: fix overflow in check for tp_frame_nr (Andrey Konovalov) [Orabug: 26143563] {CVE-2017-7308} - char: lp: fix possible integer overflow in lp_setup() (Willy Tarreau) [Orabug: 26403941] {CVE-2017-1000363} - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380} - ALSA: timer: Fix race between read and ioctl (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380} - ALSA: timer: fix NULL pointer dereference in read()/ioctl() race (Vegard Nossum) [Orabug: 26403958] {CVE-2017-1000380} - ALSA: timer: Fix negative queue usage by racy accesses (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380} - ALSA: timer: Fix race at concurrent reads (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380} - ALSA: timer: Fix race among timer ioctls (Takashi Iwai) [Orabug: 26403958] {CVE-2017-1000380} - ipv6: xfrm: Handle errors reported by xfrm6_find_1stfragopt() (Ben Hutchings) [Orabug: 26403974] {CVE-2017-9074} - ipv6: Check ip6_find_1stfragopt() return value properly. (David S. Miller) [Orabug: 26403974] {CVE-2017-9074} - ipv6: Prevent overrun when parsing v6 header options (Craig Gallek) [Orabug: 26403974] {CVE-2017-9074} - ipv6/dccp: do not inherit ipv6_mc_list from parent (WANG Cong) [Orabug: 26404007] {CVE-2017-9077} - aio: mark AIO pseudo-fs noexec (Jann Horn) [Orabug: 26643601] {CVE-2016-10044} - vfs: Commit to never having exectuables on proc and sysfs. (Eric W. Biederman) [Orabug: 26643601] {CVE-2016-10044} - vfs, writeback: replace FS_CGROUP_WRITEBACK with SB_I_CGROUPWB (Tejun Heo) [Orabug: 26643601] {CVE-2016-10044} - x86/acpi: Prevent out of bound access caused by broken ACPI tables (Seunghun Han) [Orabug: 26643652] {CVE-2017-11473} - sctp: do not inherit ipv6_{mc|ac|fl}_list from parent (Eric Dumazet) [Orabug: 26650889] {CVE-2017-9075} - saa7164: fix double fetch PCIe access condition (Steven Toth) [Orabug: 26675148] {CVE-2017-8831} - saa7164: fix sparse warnings (Hans Verkuil) [Orabug: 26675148] {CVE-2017-8831} - saa7164: get rid of warning: no previous prototype (Mauro Carvalho Chehab) [Orabug: 26675148] {CVE-2017-8831} - [scsi] lpfc 8.3.44: Fix kernel panics from corrupted ndlp (James Smart) [Orabug: 26765341] - timerfd: Protect the might cancel mechanism proper (Thomas Gleixner) [Orabug: 26899791] {CVE-2017-10661} - scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn
    last seen2020-06-05
    modified2017-12-11
    plugin id105145
    published2017-12-11
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/105145
    titleOracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2017-3658) (BlueBorne) (Stack Clash)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0113_KERNEL.NASL
    descriptionThe remote NewStart CGSL host, running version MAIN 4.05, has kernel packages installed that are affected by multiple vulnerabilities: - It was found that the fix for CVE-2016-9576 was incomplete: the Linux kernel
    last seen2020-06-01
    modified2020-06-02
    plugin id127351
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127351
    titleNewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0113)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2017-2795.NASL
    descriptionFrom Red Hat Security Advisory 2017:2795 : An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103525
    published2017-09-28
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103525
    titleOracle Linux 6 : kernel (ELSA-2017-2795)
  • NASL familyVirtuozzo Local Security Checks
    NASL idVIRTUOZZO_VZA-2017-090.NASL
    descriptionAccording to the version of the parallels-server-bm-release / vzkernel / etc packages installed, the Virtuozzo installation on the remote host is affected by the following vulnerability : - A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103571
    published2017-10-02
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103571
    titleVirtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2017-090)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2017-3626.NASL
    descriptionDescription of changes: [2.6.39-400.297.9.el6uek] - fs/binfmt_elf.c: fix bug in loading of PIE binaries (Michael Davidson) [Orabug: 26870958] {CVE-2017-1000253}
    last seen2020-06-01
    modified2020-06-02
    plugin id103560
    published2017-09-29
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103560
    titleOracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2017-3626)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2017-2725-1.NASL
    descriptionThe SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following issues : - Stack corruption could have lead to local privilege escalation (bsc#1059525, CVE-2017-1000253). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id103853
    published2017-10-16
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103853
    titleSUSE SLES11 Security Update : kernel (SUSE-SU-2017:2725-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2797.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103496
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103496
    titleRHEL 6 : kernel (RHSA-2017:2797)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2017-2723-1.NASL
    descriptionThe SUSE Linux Enterprise 11 SP4 kernel was updated to fix the following issues : - Stack corruption could have lead to local privilege escalation (bsc#1059525, CVE-2017-1000253). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id103852
    published2017-10-16
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103852
    titleSUSE SLES11 Security Update : kernel (SUSE-SU-2017:2723-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2798.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103497
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103497
    titleRHEL 6 : kernel (RHSA-2017:2798)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2017-2795.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103517
    published2017-09-28
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103517
    titleCentOS 6 : kernel (CESA-2017:2795)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2599.NASL
    descriptionAccording to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.Security Fix(es):** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says
    last seen2020-05-08
    modified2019-12-18
    plugin id132134
    published2019-12-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132134
    titleEulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-2599)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2793.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103492
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103492
    titleRHEL 7 : kernel (RHSA-2017:2793)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2015-603.NASL
    descriptionA race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. (CVE-2015-7613) Linux kernels built with the name spaces support(CONFIG_NAMESPACE) is vulnerable to a potential privilege escalation flaw. It could occur when a process within a container escapes the intended bind mounts to access the full file system. A privileged user inside a container could use this flaw to potentially gain full privileges on a system. (CVE-2015-2925) A NULL pointer dereference vulnerability was found in the Linux kernel
    last seen2020-06-01
    modified2020-06-02
    plugin id86634
    published2015-10-29
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86634
    titleAmazon Linux AMI : kernel (ALAS-2015-603)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2794.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 7.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103493
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103493
    titleRHEL 7 : kernel (RHSA-2017:2794)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2795.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103494
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103494
    titleRHEL 6 : kernel (RHSA-2017:2795)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2800.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103499
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103499
    titleRHEL 6 : kernel (RHSA-2017:2800)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2796.NASL
    descriptionAn update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-06-01
    modified2020-06-02
    plugin id103495
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103495
    titleRHEL 6 : kernel (RHSA-2017:2796)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20170926_KERNEL_ON_SL6_X.NASL
    descriptionSecurity Fix(es) : - A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application
    last seen2020-03-18
    modified2017-09-27
    plugin id103502
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103502
    titleScientific Linux Security Update : kernel on SL6.x i386/x86_64 (20170926)

Redhat

advisories
  • bugzilla
    id1492212
    titleCVE-2017-1000253 kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • commentkernel earlier than 0:2.6.32-696.10.3.el6 is currently running
          ovaloval:com.redhat.rhsa:tst:20172795027
        • commentkernel earlier than 0:2.6.32-696.10.3.el6 is set to boot up on next boot
          ovaloval:com.redhat.rhsa:tst:20172795028
      • OR
        • AND
          • commentpython-perf is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795001
          • commentpython-perf is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20111530024
        • AND
          • commentkernel-abi-whitelists is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795003
          • commentkernel-abi-whitelists is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20131645022
        • AND
          • commentkernel-doc is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795005
          • commentkernel-doc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842002
        • AND
          • commentkernel-firmware is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795007
          • commentkernel-firmware is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842004
        • AND
          • commentkernel is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795009
          • commentkernel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842012
        • AND
          • commentkernel-devel is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795011
          • commentkernel-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842016
        • AND
          • commentperf is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795013
          • commentperf is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842006
        • AND
          • commentkernel-debug is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795015
          • commentkernel-debug is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842014
        • AND
          • commentkernel-headers is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795017
          • commentkernel-headers is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842010
        • AND
          • commentkernel-debug-devel is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795019
          • commentkernel-debug-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842008
        • AND
          • commentkernel-bootwrapper is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795021
          • commentkernel-bootwrapper is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842018
        • AND
          • commentkernel-kdump is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795023
          • commentkernel-kdump is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842020
        • AND
          • commentkernel-kdump-devel is earlier than 0:2.6.32-696.10.3.el6
            ovaloval:com.redhat.rhsa:tst:20172795025
          • commentkernel-kdump-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842022
    rhsa
    idRHSA-2017:2795
    released2017-09-26
    severityImportant
    titleRHSA-2017:2795: kernel security update (Important)
  • bugzilla
    id1492212
    titleCVE-2017-1000253 kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • commentkernel earlier than 0:2.6.18-423.el5 is currently running
          ovaloval:com.redhat.rhsa:tst:20172801025
        • commentkernel earlier than 0:2.6.18-423.el5 is set to boot up on next boot
          ovaloval:com.redhat.rhsa:tst:20172801026
      • OR
        • AND
          • commentkernel is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801001
          • commentkernel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314008
        • AND
          • commentkernel-debug is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801003
          • commentkernel-debug is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314014
        • AND
          • commentkernel-debug-devel is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801005
          • commentkernel-debug-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314004
        • AND
          • commentkernel-kdump is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801007
          • commentkernel-kdump is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314010
        • AND
          • commentkernel-kdump-devel is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801009
          • commentkernel-kdump-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314012
        • AND
          • commentkernel-headers is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801011
          • commentkernel-headers is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314006
        • AND
          • commentkernel-devel is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801013
          • commentkernel-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314016
        • AND
          • commentkernel-doc is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801015
          • commentkernel-doc is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314002
        • AND
          • commentkernel-xen-devel is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801017
          • commentkernel-xen-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314020
        • AND
          • commentkernel-PAE is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801019
          • commentkernel-PAE is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314024
        • AND
          • commentkernel-xen is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801021
          • commentkernel-xen is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314018
        • AND
          • commentkernel-PAE-devel is earlier than 0:2.6.18-423.el5
            ovaloval:com.redhat.rhsa:tst:20172801023
          • commentkernel-PAE-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20080314022
    rhsa
    idRHSA-2017:2801
    released2017-09-26
    severityImportant
    titleRHSA-2017:2801: kernel security update (Important)
  • rhsa
    idRHSA-2017:2793
  • rhsa
    idRHSA-2017:2794
  • rhsa
    idRHSA-2017:2796
  • rhsa
    idRHSA-2017:2797
  • rhsa
    idRHSA-2017:2798
  • rhsa
    idRHSA-2017:2799
  • rhsa
    idRHSA-2017:2800
  • rhsa
    idRHSA-2017:2802
rpms
  • kernel-0:3.10.0-514.32.3.el7
  • kernel-abi-whitelists-0:3.10.0-514.32.3.el7
  • kernel-bootwrapper-0:3.10.0-514.32.3.el7
  • kernel-debug-0:3.10.0-514.32.3.el7
  • kernel-debug-debuginfo-0:3.10.0-514.32.3.el7
  • kernel-debug-devel-0:3.10.0-514.32.3.el7
  • kernel-debuginfo-0:3.10.0-514.32.3.el7
  • kernel-debuginfo-common-ppc64-0:3.10.0-514.32.3.el7
  • kernel-debuginfo-common-ppc64le-0:3.10.0-514.32.3.el7
  • kernel-debuginfo-common-s390x-0:3.10.0-514.32.3.el7
  • kernel-debuginfo-common-x86_64-0:3.10.0-514.32.3.el7
  • kernel-devel-0:3.10.0-514.32.3.el7
  • kernel-doc-0:3.10.0-514.32.3.el7
  • kernel-headers-0:3.10.0-514.32.3.el7
  • kernel-kdump-0:3.10.0-514.32.3.el7
  • kernel-kdump-debuginfo-0:3.10.0-514.32.3.el7
  • kernel-kdump-devel-0:3.10.0-514.32.3.el7
  • kernel-tools-0:3.10.0-514.32.3.el7
  • kernel-tools-debuginfo-0:3.10.0-514.32.3.el7
  • kernel-tools-libs-0:3.10.0-514.32.3.el7
  • kernel-tools-libs-devel-0:3.10.0-514.32.3.el7
  • perf-0:3.10.0-514.32.3.el7
  • perf-debuginfo-0:3.10.0-514.32.3.el7
  • python-perf-0:3.10.0-514.32.3.el7
  • python-perf-debuginfo-0:3.10.0-514.32.3.el7
  • kernel-0:3.10.0-327.59.3.el7
  • kernel-abi-whitelists-0:3.10.0-327.59.3.el7
  • kernel-bootwrapper-0:3.10.0-327.59.3.el7
  • kernel-debug-0:3.10.0-327.59.3.el7
  • kernel-debug-debuginfo-0:3.10.0-327.59.3.el7
  • kernel-debug-devel-0:3.10.0-327.59.3.el7
  • kernel-debuginfo-0:3.10.0-327.59.3.el7
  • kernel-debuginfo-common-ppc64-0:3.10.0-327.59.3.el7
  • kernel-debuginfo-common-ppc64le-0:3.10.0-327.59.3.el7
  • kernel-debuginfo-common-s390x-0:3.10.0-327.59.3.el7
  • kernel-debuginfo-common-x86_64-0:3.10.0-327.59.3.el7
  • kernel-devel-0:3.10.0-327.59.3.el7
  • kernel-doc-0:3.10.0-327.59.3.el7
  • kernel-headers-0:3.10.0-327.59.3.el7
  • kernel-kdump-0:3.10.0-327.59.3.el7
  • kernel-kdump-debuginfo-0:3.10.0-327.59.3.el7
  • kernel-kdump-devel-0:3.10.0-327.59.3.el7
  • kernel-tools-0:3.10.0-327.59.3.el7
  • kernel-tools-debuginfo-0:3.10.0-327.59.3.el7
  • kernel-tools-libs-0:3.10.0-327.59.3.el7
  • kernel-tools-libs-devel-0:3.10.0-327.59.3.el7
  • perf-0:3.10.0-327.59.3.el7
  • perf-debuginfo-0:3.10.0-327.59.3.el7
  • python-perf-0:3.10.0-327.59.3.el7
  • python-perf-debuginfo-0:3.10.0-327.59.3.el7
  • kernel-0:2.6.32-696.10.3.el6
  • kernel-abi-whitelists-0:2.6.32-696.10.3.el6
  • kernel-bootwrapper-0:2.6.32-696.10.3.el6
  • kernel-debug-0:2.6.32-696.10.3.el6
  • kernel-debug-debuginfo-0:2.6.32-696.10.3.el6
  • kernel-debug-devel-0:2.6.32-696.10.3.el6
  • kernel-debuginfo-0:2.6.32-696.10.3.el6
  • kernel-debuginfo-common-i686-0:2.6.32-696.10.3.el6
  • kernel-debuginfo-common-ppc64-0:2.6.32-696.10.3.el6
  • kernel-debuginfo-common-s390x-0:2.6.32-696.10.3.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-696.10.3.el6
  • kernel-devel-0:2.6.32-696.10.3.el6
  • kernel-doc-0:2.6.32-696.10.3.el6
  • kernel-firmware-0:2.6.32-696.10.3.el6
  • kernel-headers-0:2.6.32-696.10.3.el6
  • kernel-kdump-0:2.6.32-696.10.3.el6
  • kernel-kdump-debuginfo-0:2.6.32-696.10.3.el6
  • kernel-kdump-devel-0:2.6.32-696.10.3.el6
  • perf-0:2.6.32-696.10.3.el6
  • perf-debuginfo-0:2.6.32-696.10.3.el6
  • python-perf-0:2.6.32-696.10.3.el6
  • python-perf-debuginfo-0:2.6.32-696.10.3.el6
  • kernel-0:2.6.32-573.48.1.el6
  • kernel-abi-whitelists-0:2.6.32-573.48.1.el6
  • kernel-bootwrapper-0:2.6.32-573.48.1.el6
  • kernel-debug-0:2.6.32-573.48.1.el6
  • kernel-debug-debuginfo-0:2.6.32-573.48.1.el6
  • kernel-debug-devel-0:2.6.32-573.48.1.el6
  • kernel-debuginfo-0:2.6.32-573.48.1.el6
  • kernel-debuginfo-common-i686-0:2.6.32-573.48.1.el6
  • kernel-debuginfo-common-ppc64-0:2.6.32-573.48.1.el6
  • kernel-debuginfo-common-s390x-0:2.6.32-573.48.1.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-573.48.1.el6
  • kernel-devel-0:2.6.32-573.48.1.el6
  • kernel-doc-0:2.6.32-573.48.1.el6
  • kernel-firmware-0:2.6.32-573.48.1.el6
  • kernel-headers-0:2.6.32-573.48.1.el6
  • kernel-kdump-0:2.6.32-573.48.1.el6
  • kernel-kdump-debuginfo-0:2.6.32-573.48.1.el6
  • kernel-kdump-devel-0:2.6.32-573.48.1.el6
  • perf-0:2.6.32-573.48.1.el6
  • perf-debuginfo-0:2.6.32-573.48.1.el6
  • python-perf-0:2.6.32-573.48.1.el6
  • python-perf-debuginfo-0:2.6.32-573.48.1.el6
  • kernel-0:2.6.32-504.63.3.el6
  • kernel-abi-whitelists-0:2.6.32-504.63.3.el6
  • kernel-debug-0:2.6.32-504.63.3.el6
  • kernel-debug-debuginfo-0:2.6.32-504.63.3.el6
  • kernel-debug-devel-0:2.6.32-504.63.3.el6
  • kernel-debuginfo-0:2.6.32-504.63.3.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-504.63.3.el6
  • kernel-devel-0:2.6.32-504.63.3.el6
  • kernel-doc-0:2.6.32-504.63.3.el6
  • kernel-firmware-0:2.6.32-504.63.3.el6
  • kernel-headers-0:2.6.32-504.63.3.el6
  • perf-0:2.6.32-504.63.3.el6
  • perf-debuginfo-0:2.6.32-504.63.3.el6
  • python-perf-0:2.6.32-504.63.3.el6
  • python-perf-debuginfo-0:2.6.32-504.63.3.el6
  • kernel-0:2.6.32-431.85.1.el6
  • kernel-abi-whitelists-0:2.6.32-431.85.1.el6
  • kernel-debug-0:2.6.32-431.85.1.el6
  • kernel-debug-debuginfo-0:2.6.32-431.85.1.el6
  • kernel-debug-devel-0:2.6.32-431.85.1.el6
  • kernel-debuginfo-0:2.6.32-431.85.1.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-431.85.1.el6
  • kernel-devel-0:2.6.32-431.85.1.el6
  • kernel-doc-0:2.6.32-431.85.1.el6
  • kernel-firmware-0:2.6.32-431.85.1.el6
  • kernel-headers-0:2.6.32-431.85.1.el6
  • perf-0:2.6.32-431.85.1.el6
  • perf-debuginfo-0:2.6.32-431.85.1.el6
  • python-perf-0:2.6.32-431.85.1.el6
  • python-perf-debuginfo-0:2.6.32-431.85.1.el6
  • kernel-0:2.6.32-358.84.1.el6
  • kernel-debug-0:2.6.32-358.84.1.el6
  • kernel-debug-debuginfo-0:2.6.32-358.84.1.el6
  • kernel-debug-devel-0:2.6.32-358.84.1.el6
  • kernel-debuginfo-0:2.6.32-358.84.1.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-358.84.1.el6
  • kernel-devel-0:2.6.32-358.84.1.el6
  • kernel-doc-0:2.6.32-358.84.1.el6
  • kernel-firmware-0:2.6.32-358.84.1.el6
  • kernel-headers-0:2.6.32-358.84.1.el6
  • perf-0:2.6.32-358.84.1.el6
  • perf-debuginfo-0:2.6.32-358.84.1.el6
  • python-perf-0:2.6.32-358.84.1.el6
  • python-perf-debuginfo-0:2.6.32-358.84.1.el6
  • kernel-0:2.6.32-220.76.1.el6
  • kernel-debug-0:2.6.32-220.76.1.el6
  • kernel-debug-debuginfo-0:2.6.32-220.76.1.el6
  • kernel-debug-devel-0:2.6.32-220.76.1.el6
  • kernel-debuginfo-0:2.6.32-220.76.1.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-220.76.1.el6
  • kernel-devel-0:2.6.32-220.76.1.el6
  • kernel-doc-0:2.6.32-220.76.1.el6
  • kernel-firmware-0:2.6.32-220.76.1.el6
  • kernel-headers-0:2.6.32-220.76.1.el6
  • perf-0:2.6.32-220.76.1.el6
  • perf-debuginfo-0:2.6.32-220.76.1.el6
  • python-perf-0:2.6.32-220.76.1.el6
  • python-perf-debuginfo-0:2.6.32-220.76.1.el6
  • kernel-0:2.6.18-423.el5
  • kernel-PAE-0:2.6.18-423.el5
  • kernel-PAE-debuginfo-0:2.6.18-423.el5
  • kernel-PAE-devel-0:2.6.18-423.el5
  • kernel-debug-0:2.6.18-423.el5
  • kernel-debug-debuginfo-0:2.6.18-423.el5
  • kernel-debug-devel-0:2.6.18-423.el5
  • kernel-debuginfo-0:2.6.18-423.el5
  • kernel-debuginfo-common-0:2.6.18-423.el5
  • kernel-devel-0:2.6.18-423.el5
  • kernel-doc-0:2.6.18-423.el5
  • kernel-headers-0:2.6.18-423.el5
  • kernel-kdump-0:2.6.18-423.el5
  • kernel-kdump-debuginfo-0:2.6.18-423.el5
  • kernel-kdump-devel-0:2.6.18-423.el5
  • kernel-xen-0:2.6.18-423.el5
  • kernel-xen-debuginfo-0:2.6.18-423.el5
  • kernel-xen-devel-0:2.6.18-423.el5
  • kernel-0:2.6.18-348.34.2.el5
  • kernel-PAE-0:2.6.18-348.34.2.el5
  • kernel-PAE-debuginfo-0:2.6.18-348.34.2.el5
  • kernel-PAE-devel-0:2.6.18-348.34.2.el5
  • kernel-debug-0:2.6.18-348.34.2.el5
  • kernel-debug-debuginfo-0:2.6.18-348.34.2.el5
  • kernel-debug-devel-0:2.6.18-348.34.2.el5
  • kernel-debuginfo-0:2.6.18-348.34.2.el5
  • kernel-debuginfo-common-0:2.6.18-348.34.2.el5
  • kernel-devel-0:2.6.18-348.34.2.el5
  • kernel-doc-0:2.6.18-348.34.2.el5
  • kernel-headers-0:2.6.18-348.34.2.el5
  • kernel-xen-0:2.6.18-348.34.2.el5
  • kernel-xen-debuginfo-0:2.6.18-348.34.2.el5
  • kernel-xen-devel-0:2.6.18-348.34.2.el5

The Hacker News

idTHN:004E66289E140230A54AEB25D3223C13
last seen2018-01-27
modified2017-09-28
published2017-09-27
reporterMohit Kumar
sourcehttps://thehackernews.com/2017/09/linux-kernel-hacking.html
title2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw