Published on: 23 June 2017
Multiple vulnerabilities were found in the memory management of the affected operating systems. These vulnerabilities can lead to privilege escalation on these systems by corrupting memory and executing arbitrary code. A local attacker may leverage these vulnerabilities in the affected systems to gain root privileges.
Successful exploitation could lead to elevation of privilege or compromise of a vulnerable system.
The vulnerabilities were mitigated in some of the affected systems, such as CentOS, Debian, Oracle Linux, RedHat, SUSE and Ubuntu. System administrators should check with their product vendors to confirm if their Linux/Unix systems are affected and the availability of patches, and if so, apply the patches or follow the recommendations provided by the product vendors to mitigate the risk.
https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://www.cyberciti.biz/faq/howto-patch-linux-kernel-stack-clash-vulnerability-cve-2017-1000364/
http://cert.europa.eu/static/SecurityAdvisories/2017/CERT-EU-SA2017-013.pdf
https://access.redhat.com/security/vulnerabilities/stackguard
https://bugs.centos.org/view.php?id=13453
https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/008_exec_subr.patch.sig
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366