Hi all,

In the interest of being a good citizen there's a new local root
vulnerability for Linux, *BSD and Solaris.

https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash

# The Stack Clash is a vulnerability in the memory management of
# several operating systems. It affects Linux, OpenBSD, NetBSD,
# FreeBSD and Solaris, on i386 and amd64.  It can be exploited
# by attackers to corrupt memory and execute arbitrary code.

They list links to various distros information on the issue.

For instance RHEL have released both kernel and glibc updates, but of
course that begs the question of statically linked binaries (yes, I
know, don't do that, but they are common) and containers such as Shifter
& Singularity with older glibc's.

I suspect in those cases you have to rely entirely on the kernel
mitigation of increasing the stack guard gap size.

cheers,
Chris
-- 
 Christopher Samuel        Senior Systems Administrator
 Melbourne Bioinformatics - The University of Melbourne
 Email: sam...@unimelb.edu.au Phone: +61 (0)3 903 55545

_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org sponsored by Penguin Computing
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf

Reply via email to