Количество 13
Количество 13

CVE-2016-3672
The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVE-2016-3672
The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVE-2016-3672
The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
CVE-2016-3672
The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux ...
GHSA-mr57-vcj3-9pgx
The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
ELSA-2017-3535
ELSA-2017-3535: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3534
ELSA-2017-3534: Unbreakable Enterprise kernel security update (IMPORTANT)

openSUSE-SU-2016:1641-1
Security update for the Linux Kernel

SUSE-SU-2016:2105-1
Security update for the Linux Kernel
ELSA-2017-3533
ELSA-2017-3533: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2016:1937-1
Security update for the Linux Kernel
ELSA-2018-1062
ELSA-2018-1062: kernel security, bug fix, and enhancement update (IMPORTANT)

SUSE-SU-2016:1690-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2016-3672 The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits. | CVSS3: 7.8 | 0% Низкий | около 9 лет назад |
![]() | CVE-2016-3672 The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits. | CVSS2: 4.6 | 0% Низкий | около 9 лет назад |
![]() | CVE-2016-3672 The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits. | CVSS3: 7.8 | 0% Низкий | около 9 лет назад |
CVE-2016-3672 The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux ... | CVSS3: 7.8 | 0% Низкий | около 9 лет назад | |
GHSA-mr57-vcj3-9pgx The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
ELSA-2017-3535 ELSA-2017-3535: Unbreakable Enterprise kernel security update (IMPORTANT) | около 8 лет назад | |||
ELSA-2017-3534 ELSA-2017-3534: Unbreakable Enterprise kernel security update (IMPORTANT) | около 8 лет назад | |||
![]() | openSUSE-SU-2016:1641-1 Security update for the Linux Kernel | около 9 лет назад | ||
![]() | SUSE-SU-2016:2105-1 Security update for the Linux Kernel | почти 9 лет назад | ||
ELSA-2017-3533 ELSA-2017-3533: Unbreakable Enterprise kernel security update (IMPORTANT) | около 8 лет назад | |||
![]() | SUSE-SU-2016:1937-1 Security update for the Linux Kernel | почти 9 лет назад | ||
ELSA-2018-1062 ELSA-2018-1062: kernel security, bug fix, and enhancement update (IMPORTANT) | около 7 лет назад | |||
![]() | SUSE-SU-2016:1690-1 Security update for the Linux Kernel | почти 9 лет назад |
Уязвимостей на страницу