Логотип exploitDog
bind:CVE-2016-3672
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-3672

Количество 13

Количество 13

ubuntu логотип

CVE-2016-3672

около 9 лет назад

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2016-3672

около 9 лет назад

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2016-3672

около 9 лет назад

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2016-3672

около 9 лет назад

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-mr57-vcj3-9pgx

около 3 лет назад

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2017-3535

около 8 лет назад

ELSA-2017-3535: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3534

около 8 лет назад

ELSA-2017-3534: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:1641-1

около 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:2105-1

почти 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3533

около 8 лет назад

ELSA-2017-3533: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:1937-1

почти 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2018-1062

около 7 лет назад

ELSA-2018-1062: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:1690-1

почти 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-3672

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVSS3: 7.8
0%
Низкий
около 9 лет назад
redhat логотип
CVE-2016-3672

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVSS2: 4.6
0%
Низкий
около 9 лет назад
nvd логотип
CVE-2016-3672

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVSS3: 7.8
0%
Низкий
около 9 лет назад
debian логотип
CVE-2016-3672

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux ...

CVSS3: 7.8
0%
Низкий
около 9 лет назад
github логотип
GHSA-mr57-vcj3-9pgx

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2017-3535

ELSA-2017-3535: Unbreakable Enterprise kernel security update (IMPORTANT)

около 8 лет назад
oracle-oval логотип
ELSA-2017-3534

ELSA-2017-3534: Unbreakable Enterprise kernel security update (IMPORTANT)

около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2016:1641-1

Security update for the Linux Kernel

около 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:2105-1

Security update for the Linux Kernel

почти 9 лет назад
oracle-oval логотип
ELSA-2017-3533

ELSA-2017-3533: Unbreakable Enterprise kernel security update (IMPORTANT)

около 8 лет назад
suse-cvrf логотип
SUSE-SU-2016:1937-1

Security update for the Linux Kernel

почти 9 лет назад
oracle-oval логотип
ELSA-2018-1062

ELSA-2018-1062: kernel security, bug fix, and enhancement update (IMPORTANT)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2016:1690-1

Security update for the Linux Kernel

почти 9 лет назад

Уязвимостей на страницу