Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-1000379

Опубликовано: 19 июн. 2017
Источник: debian

Описание

The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.11.6-1package
linuxfixed4.9.30-2+deb9u1stretchpackage
linuxfixed3.16.43-2+deb8u1jessiepackage

Примечания

  • https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.

CVSS3: 2.9
redhat
больше 8 лет назад

The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.

CVSS3: 7.8
nvd
больше 8 лет назад

The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.

CVSS3: 7.8
github
больше 3 лет назад

The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.

CVSS3: 7.8
fstec
больше 8 лет назад

Уязвимость ядра операционной системы Linux, позволяющая нарушителю манипулировать стеком