SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
(Oracle Issues Fix for Oracle Linux) Linux Kernel Stack Corruption Flaw in PIE Executables Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1041422
SecurityTracker URL:  http://securitytracker.com/id/1041422
CVE Reference:   CVE-2017-1000253   (Links to External Site)
Date:  Aug 6 2018
Impact:   Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Oracle Linux 5
Description:   A vulnerability was reported in the Linux kernel. A local user can obtain elevated privileges on the target system.

A local user can exploit a flaw in applications built as Position Independent Executable (PIE) ELF executables to trigger a stack corruption error and execute arbitrary code. The code will run with the privileges of the target application.

The original advisory is available at:

https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt

Qualys, Inc. reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2018-1196-1.html

Vendor URL:  linux.oracle.com/errata/ELSA-2018-1196-1.html (Links to External Site)
Cause:   Boundary error

Message History:   This archive entry is a follow-up to the message listed below.
Sep 27 2017 Linux Kernel Stack Corruption Flaw in PIE Executables Lets Local Users Gain Elevated Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2018-1196-1 Important: Oracle Linux 5 Extended Lifecycle Support (ELS) kernel security and bug fix update

Oracle Linux Security Advisory ELSA-2018-1196-1

http://linux.oracle.com/errata/ELSA-2018-1196-1.html

The following updated rpms for Oracle Linux 5 Extended Lifecycle Support 
(ELS) have been uploaded to the Unbreakable Linux Network:

i386:
kernel-2.6.18-419.0.0.0.10.el5.i686.rpm
kernel-PAE-2.6.18-419.0.0.0.10.el5.i686.rpm
kernel-PAE-devel-2.6.18-419.0.0.0.10.el5.i686.rpm
kernel-debug-2.6.18-419.0.0.0.10.el5.i686.rpm
kernel-debug-devel-2.6.18-419.0.0.0.10.el5.i686.rpm
kernel-devel-2.6.18-419.0.0.0.10.el5.i686.rpm
kernel-doc-2.6.18-419.0.0.0.10.el5.noarch.rpm
kernel-headers-2.6.18-419.0.0.0.10.el5.i386.rpm
kernel-xen-2.6.18-419.0.0.0.10.el5.i686.rpm
kernel-xen-devel-2.6.18-419.0.0.0.10.el5.i686.rpm

x86_64:
kernel-2.6.18-419.0.0.0.10.el5.x86_64.rpm
kernel-debug-2.6.18-419.0.0.0.10.el5.x86_64.rpm
kernel-debug-devel-2.6.18-419.0.0.0.10.el5.x86_64.rpm
kernel-devel-2.6.18-419.0.0.0.10.el5.x86_64.rpm
kernel-doc-2.6.18-419.0.0.0.10.el5.noarch.rpm
kernel-headers-2.6.18-419.0.0.0.10.el5.x86_64.rpm
kernel-xen-2.6.18-419.0.0.0.10.el5.x86_64.rpm
kernel-xen-devel-2.6.18-419.0.0.0.10.el5.x86_64.rpm


The following packages were rebuilt to be in sync with the updated 
kernel version (no changes other than updating the version number):
i386:
ocfs2-2.6.18-419.0.0.0.10.el5-1.4.11-1.el5.i686.rpm
ocfs2-2.6.18-419.0.0.0.10.el5PAE-1.4.11-1.el5.i686.rpm
ocfs2-2.6.18-419.0.0.0.10.el5xen-1.4.11-1.el5.i686.rpm
ocfs2-2.6.18-419.0.0.0.10.el5debug-1.4.11-1.el5.i686.rpm
oracleasm-2.6.18-419.0.0.0.10.el5-2.0.5-2.el5.i686.rpm
oracleasm-2.6.18-419.0.0.0.10.el5PAE-2.0.5-2.el5.i686.rpm
oracleasm-2.6.18-419.0.0.0.10.el5xen-2.0.5-2.el5.i686.rpm
oracleasm-2.6.18-419.0.0.0.10.el5debug-2.0.5-2.el5.i686.rpm

x86_64:
ocfs2-2.6.18-419.0.0.0.10.el5-1.4.11-1.el5.x86_64.rpm
ocfs2-2.6.18-419.0.0.0.10.el5xen-1.4.11-1.el5.x86_64.rpm
ocfs2-2.6.18-419.0.0.0.10.el5debug-1.4.11-1.el5.x86_64.rpm
oracleasm-2.6.18-419.0.0.0.10.el5-2.0.5-2.el5.x86_64.rpm
oracleasm-2.6.18-419.0.0.0.10.el5xen-2.0.5-2.el5.x86_64.rpm
oracleasm-2.6.18-419.0.0.0.10.el5debug-2.0.5-2.el5.x86_64.rpm


Description of changes:

kernel
- 2.6.18-419.0.0.0.10.el5
- Backport CVE-2017-5715 to RHCK/OL5 [orabug 27787723]

- 2.6.18-419.0.0.0.9.el5
- rebuild with retpoline compiler

- 2.6.18-419.0.0.0.8.el5
- Backport CVEs to RHCK/OL5 [orabug 27547712] {CVE-2017-5753} 
{CVE-2017-5754}

- 2.6.18-419.0.0.0.5.el5
- [fs] fix kernel panic on boot on ia64 guests (Honglei Wang) [orabug 
26934100]

- 2.6.18-419.0.0.0.4.el5
- [fs] fix bug in loading of PIE binaries (Michael Davidson) [orabug 
26916951] {CVE-2017-1000253}

- 2.6.18-419.0.0.0.3.el5
- nfsd: stricter decoding of write-like NFSv2/v3 ops (J. Bruce Fields) 
[orabug 26586706] {CVE-2017-7895}


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC