Описание
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | DNE | |
| devel | DNE | |
| disco | DNE | |
| eoan | DNE | |
| esm-infra-legacy/trusty | not-affected | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| precise/esm | not-affected | |
| trusty | ignored | end of standard support |
| trusty/esm | not-affected |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.27-3ubuntu1.2 |
| devel | not-affected | 2.31-0ubuntu7 |
| disco | ignored | end of life |
| eoan | released | 2.30-0ubuntu2.2 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | released | 2.27-3ubuntu1.2 |
| esm-infra/focal | not-affected | 2.31-0ubuntu7 |
| esm-infra/xenial | released | 2.23-0ubuntu11.2 |
| focal | not-affected | 2.31-0ubuntu7 |
| precise/esm | DNE |
Показывать по
2.1 Low
CVSS2
3.3 Low
CVSS3
Связанные уязвимости
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 ...
2.1 Low
CVSS2
3.3 Low
CVSS3