[Beowulf] Heads up - Stack-Clash local root vulnerability
Christopher Samuel
samuel at unimelb.edu.au
Wed Jun 21 17:09:03 PDT 2017
On 22/06/17 06:54, mathog wrote:
> Most end user code would not need to be recompiled, since it does not
> run with privileges.
Ah, that's a very interesting point, the advisory doesn't explicitly
mention it but of course all the CVE's for applications (Exim, sudo, su,
at, etc) relate to to setuid binaries, plus this one:
- a local-root exploit against ld.so and most SUID-root binaries
(CVE-2017-1000366, CVE-2017-1000379) on amd64 Debian, Ubuntu, Fedora,
CentOS;
So yes, you are quite right, this (currently) doesn't seem like
something you need to worry about with users own codes being copied onto
the system or containers utilised through Shifter and Singularity which
exist to disarm Docker containers.
Phew, thanks so much for pointing that out! :-)
All the best,
Chris
--
Christopher Samuel Senior Systems Administrator
Melbourne Bioinformatics - The University of Melbourne
Email: samuel at unimelb.edu.au Phone: +61 (0)3 903 55545
More information about the Beowulf
mailing list