描述:
在受影响操作系统的记忆体管理中发现了多个漏洞。这些漏洞能透过损毁内存及执行任意程式码导致在这些系统的取得权限提升。本机攻击者可以利用这些漏洞在受影响的系统内取得root权限。
受影响的系统:
- 建基于 kernel 4.11.5 或以前的 Linux 作业系统(32-bit 和 64-bit)
- OpenBSD, NetBSD, FreeBSD, and Solaris 作业系统(32-bit 和 64-bit)
影响:
成功攻击这些漏洞可提升权限或控制受影响系统。
建议:
有些受影响系统,例如 CentOS, Debian, Oracle Linux, Redhat, SUSE 及 Ubuntu,提供了缓和措施。系统管理员应向产品供应商查询其 Linux/Unix 作业系统是否受影响及修补程式的情况。若修补程式已提供,应遵从产品供应商的建议,立即采取行动以降低风险。
- CentOS 6
https://lists.centos.org/pipermail/centos-announce/2017-June/022461.html
https://lists.centos.org/pipermail/centos-announce/2017-June/022462.html
- CentOS 7
https://lists.centos.org/pipermail/centos-announce/2017-June/022463.html
https://lists.centos.org/pipermail/centos-announce/2017-June/022464.html
- Debian
https://security-tracker.debian.org/tracker/CVE-2017-1000364
https://security-tracker.debian.org/tracker/CVE-2017-1000366
- Oracle Linux
https://linux.oracle.com/cve/CVE-2017-1000364.html
https://linux.oracle.com/cve/CVE-2017-1000366.html
- RedHat
https://access.redhat.com/security/cve/CVE-2017-1000364
https://access.redhat.com/security/cve/CVE-2017-1000366
- SUSE
https://www.suse.com/security/cve/CVE-2017-1000364
https://www.suse.com/security/cve/CVE-2017-1000366
- Ubuntu
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000364.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000366.html
进一步信息:
https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://www.cyberciti.biz/faq/howto-patch-linux-kernel-stack-clash-vulnerability-cve-2017-1000364/
http://cert.europa.eu/static/SecurityAdvisories/2017/CERT-EU-SA2017-013.pdf
https://access.redhat.com/security/vulnerabilities/stackguard
https://bugs.centos.org/view.php?id=13453
https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/008_exec_subr.patch.sig
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366