SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Glibc Vendors:   GNU [multiple authors]
(Oracle Issues Fix for Oracle Linux) Glibc Stack/Heap Memory Allocation Error Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1038715
SecurityTracker URL:  http://securitytracker.com/id/1038715
CVE Reference:   CVE-2017-1000366   (Links to External Site)
Date:  Jun 20 2017
Impact:   Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.25 and prior
Description:   A vulnerability was reported in Glibc. A local user can obtain elevated privileges on the target system.

A local user can supply specially crafted LD_LIBRARY_PATH values to trigger a stack memory allocation flaw in certain cases and execute arbitrary code on the target system with elevated privileges.

The stack guard-page memory gap can be "jumped" in cases where heap memory and stack memory are adjacent.

The original advisory is available at:

https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

Qualys Research Labs reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2017-1481.html

Vendor URL:  linux.oracle.com/errata/ELSA-2017-1481.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6, 7

Message History:   This archive entry is a follow-up to the message listed below.
Jun 20 2017 Glibc Stack/Heap Memory Allocation Error Lets Local Users Gain Elevated Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2017-1481 Important: Oracle Linux 7 glibc security update

Oracle Linux Security Advisory ELSA-2017-1481

http://linux.oracle.com/errata/ELSA-2017-1481.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
glibc-2.17-157.el7_3.4.i686.rpm
glibc-2.17-157.el7_3.4.x86_64.rpm
glibc-common-2.17-157.el7_3.4.x86_64.rpm
glibc-devel-2.17-157.el7_3.4.i686.rpm
glibc-devel-2.17-157.el7_3.4.x86_64.rpm
glibc-headers-2.17-157.el7_3.4.x86_64.rpm
glibc-static-2.17-157.el7_3.4.i686.rpm
glibc-static-2.17-157.el7_3.4.x86_64.rpm
glibc-utils-2.17-157.el7_3.4.x86_64.rpm
nscd-2.17-157.el7_3.4.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/glibc-2.17-157.el7_3.4.src.rpm



Description of changes:

[2.17-157.4]
- Avoid large allocas in the dynamic linker (#1452720)


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC