Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-1593

Опубликовано: 13 фев. 2015
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.

An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four.

Отчет

This issue does affect the Linux kernel versions as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates in the respective releases may address this issue. This issue does affect the Linux kernel versions as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelAffected
Red Hat Enterprise Linux 7kernel-altAffected
Red Hat Enterprise Linux 6kernelFixedRHSA-2015:122114.07.2015
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2015:113923.06.2015
Red Hat Enterprise Linux 7kernelFixedRHSA-2015:113723.06.2015
Red Hat Enterprise Linux 8kernelFixedRHSA-2019:351705.11.2019
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2015:113823.06.2015

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1192519kernel: Linux stack ASLR implementation Integer overflow

EPSS

Процентиль: 80%
0.01439
Низкий

1.9 Low

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.

nvd
больше 10 лет назад

The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.

debian
больше 10 лет назад

The stack randomization feature in the Linux kernel before 3.19.1 on 6 ...

github
около 3 лет назад

The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.

oracle-oval
почти 10 лет назад

ELSA-2015-3047: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 80%
0.01439
Низкий

1.9 Low

CVSS2