Описание
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | 2.6.31-3.19 |
hardy | released | 2.6.24-24.57 |
intrepid | released | 2.6.27-14.37 |
jaunty | released | 2.6.28-14.47 |
upstream | released | 2.6.31~rc3 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | DNE | |
hardy | DNE | |
intrepid | DNE | |
jaunty | DNE | |
upstream | released | 2.6.31~rc3 |
Показывать по
7.2 High
CVSS2
Связанные уязвимости
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a ...
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
ELSA-2009-1193: kernel security and bug fix update (IMPORTANT)
7.2 High
CVSS2