Описание
The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
An information leak flaw was found in the way the Linux kernel's Virtual Dynamic Shared Object (vDSO) implementation performed address randomization. A local, unprivileged user could use this flaw to leak kernel memory addresses to user-space.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Will not fix | ||
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2015:1081 | 09.06.2015 |
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2015:1788 | 15.09.2015 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2015:1778 | 15.09.2015 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2015:1787 | 15.09.2015 |
Показывать по
Дополнительная информация
Статус:
EPSS
1.9 Low
CVSS2
Связанные уязвимости
The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel thro ...
The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
ELSA-2015-3043: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS
1.9 Low
CVSS2