Linux PIE/stack corruption (CVE-2017-1000253) Bug and Security Vulnerability
About CVE-2017-1000253 Bug:
This issue is related to the Linux kernel loaded Executable and Linkable Format (ELF) executables. If an ELF application was built as Position Independent Executable (PIE), the loader can allow part of that application’s data segment to map over the memory area reserved for its stack.
It can cause memory corruption and may allow an unprivileged local user to gain privileged access using Set owner User ID (SUID) or privileged flawed PIE binary.
To exploit this hole PIE’s .dynamic section is smashed with a stack-based string operation which can force the ld.so dynamic linker to load and execute their own shared library.
What is impacted :
- Linux distributions that have not patched their long-term kernels with CVE-2017-1000253 patch(committed on April 14, 2015) are vulnerable to CVE-2017-1000253, a
Local Privilege Escalation.
- All versions of CentOS 7 before 1708 (released on
September 13, 2017),
- all versions of Red Hat Enterprise Linux 7 before
7.4 (released on August 1, 2017)
Red Hat Security bulletin on cve-2017-1000253
- SUSE Linux Enterprise Server 11 SP3 LTSS kernel-source and SUSE Linux Enterprise Server 11 SP4 kernel-source are affected SUSE Linux Security bulletin on CVE-2017-1000253
What you can do ?
As this was reported two years back as bug and now classified as a security vulnerability , patches are available to patch the kernel or install a patched kernel from here :