Jump to content


Kernel & Glibc Stack Guard security vulnerability


  • Please log in to reply
No replies to this topic

#1 Guest_dennis.v_*

Guest_dennis.v_*
  • Guests

Posted 23 June 2017 - 11:00 AM

A new kernel and glibc vulnerability (CVE-2017-1000364) has been reported by RedHat.

Information :

 

A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system.

You can refer to the following link for more details:

****
https://access.redha...ve-2017-1000364

****

 

How to find out whether your server is vulnerable or not?

1. Download the latest vulnerability detection script from https://access.redha...ties/stackguardfrom the Diagnose tab
2. run it on your server.

How to fix the Vulnerability?

Fortunately, applying the fix is straightforward: update your system and reboot your server.

 

For Centos, follow steps 1 and 2 : 

 

1.You can initiate a full yum update using the below command :

#yum update

OR

Just update the kernel and glibc packages:

#yum update "kernel*"
#yum update "glibc"

2. Reboot the server using the below command:-

#reboot

For Ubuntu servers :

1.For Ubuntu server, you can do this by running the command :

#apt-get update
#apt-get dist-upgrade

2. Reboot the server using the below command:-

#reboot

If you have managed dedicated server and if there is any difficulty in applying the patch, please open a ticket with the support team along with the dedicated server root user login credentials.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users