SciLinux: Important: glibc on SL7.x x86_64

    Date19 Jun 2017
    45
    Posted ByLinuxSecurity Advisories
    A flaw was found in the way memory was being allocated on the stack foruser space binaries. If heap (or different memory region) and stack memoryregions were adjacent to each other, an attacker could use this flaw tojump over the stack guard gap, cause controlled memory corruption onprocess stack or the adjacent memory region, and thus increase theirprivileges on the system. This is glibc-side mitigation which blocksprocessing of LD_LIBRARY_PATH for programs running in secure-executionmode and reduces the number of allocations performed by the processing ofLD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation ofthis issue more difficult. (CVE-2017-1000366)
    Synopsis:          Important: glibc security update
    Advisory ID:       SLSA-2017:1481-1
    Issue Date:        2017-06-19
    CVE Numbers:       CVE-2017-1000366
    --
    
    Security Fix(es):
    
    * A flaw was found in the way memory was being allocated on the stack for
    user space binaries. If heap (or different memory region) and stack memory
    regions were adjacent to each other, an attacker could use this flaw to
    jump over the stack guard gap, cause controlled memory corruption on
    process stack or the adjacent memory region, and thus increase their
    privileges on the system. This is glibc-side mitigation which blocks
    processing of LD_LIBRARY_PATH for programs running in secure-execution
    mode and reduces the number of allocations performed by the processing of
    LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of
    this issue more difficult. (CVE-2017-1000366)
    --
    
    SL7
      x86_64
        glibc-2.17-157.el7_3.4.i686.rpm
        glibc-2.17-157.el7_3.4.x86_64.rpm
        glibc-common-2.17-157.el7_3.4.x86_64.rpm
        glibc-debuginfo-2.17-157.el7_3.4.i686.rpm
        glibc-debuginfo-2.17-157.el7_3.4.x86_64.rpm
        glibc-debuginfo-common-2.17-157.el7_3.4.i686.rpm
        glibc-debuginfo-common-2.17-157.el7_3.4.x86_64.rpm
        glibc-devel-2.17-157.el7_3.4.i686.rpm
        glibc-devel-2.17-157.el7_3.4.x86_64.rpm
        glibc-headers-2.17-157.el7_3.4.x86_64.rpm
        glibc-utils-2.17-157.el7_3.4.x86_64.rpm
        nscd-2.17-157.el7_3.4.x86_64.rpm
        glibc-static-2.17-157.el7_3.4.i686.rpm
        glibc-static-2.17-157.el7_3.4.x86_64.rpm
    
    - Scientific Linux Development Team
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"67","title":"HOWTOs","votes":"2","type":"x","order":"3","pct":66.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.