Описание
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
hardy | not-affected | |
lucid | not-affected | |
maverick | not-affected | |
natty | not-affected | |
oneiric | not-affected | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | not-affected | |
maverick | ignored | end of life |
natty | DNE | |
oneiric | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | not-affected | end of life, does not affect buildd |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | not-affected | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | not-affected | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | not-affected | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | ignored | end of life |
maverick | not-affected | |
natty | DNE | |
oneiric | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
hardy | DNE | |
lucid | DNE | |
maverick | not-affected | |
natty | not-affected | |
oneiric | not-affected | |
upstream | not-affected |
Показывать по
1.9 Low
CVSS2
Связанные уязвимости
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.
The ExecShield feature in a certain Red Hat patch for the Linux kernel ...
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.
ELSA-2013-0168: kernel security and bug fix update (MODERATE)
1.9 Low
CVSS2