HaBangNet

×
×

News: Linux System Notice

Published: 25/06/2017 Back

Dear valued client,

If you are using Linux system, please read this Notice in detail.

If you are not using Linux system, please ignore this Notice.

Multiple vulnerabilities(Stack Clash) were found in the memory management of the affected operating systems.

These vulnerabilities can lead to privilege escalation on these systems by corrupting memory and executing arbitrary code.

A local attacker may leverage these vulnerabilities in the affected systems to gain root privileges.

Preventive measures for individual users

1. Perform routine backup.
Disconnect their storage device right after backup.

2. Apply latest Linux security update.

We highly recommend that customers download and update Linux patches
immediately by yourself. If we have further actions, we will contact with you via Email.

If you have any questions please feel free to contact us via ticket system。

More information for your reference,



- https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
- https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
-https://www.cyberciti.biz/faq/howto-patch-linux-kernel-stack-clash-vulnerability-cve-2017-1000364/
- http://cert.europa.eu/static/SecurityAdvisories/2017/CERT-EU-SA2017-013.pdf
- https://access.redhat.com/security/vulnerabilities/stackguard
- https://bugs.centos.org/view.php?id=13453
-https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/008_exec_subr.patch.sig


 


HaBangNet System Team


Powered by HostBill