Логотип exploitDog
bind:"GHSA-rm92-8pw8-34fm" OR bind:"CVE-2017-1000253"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-rm92-8pw8-34fm" OR bind:"CVE-2017-1000253"

Количество 14

Количество 14

github логотип

GHSA-rm92-8pw8-34fm

больше 3 лет назад

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

CVSS3: 7.8
EPSS: Средний
ubuntu логотип

CVE-2017-1000253

около 8 лет назад

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

CVSS3: 7.8
EPSS: Средний
redhat логотип

CVE-2017-1000253

около 8 лет назад

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

CVSS3: 7.8
EPSS: Средний
nvd логотип

CVE-2017-1000253

около 8 лет назад

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

CVSS3: 7.8
EPSS: Средний
debian логотип

CVE-2017-1000253

около 8 лет назад

Linux distributions that have not patched their long-term kernels with ...

CVSS3: 7.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2017:2725-1

около 8 лет назад

Security update for the Linux Kernel

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2017:2723-1

около 8 лет назад

Security update for the Linux Kernel

EPSS: Средний
oracle-oval логотип

ELSA-2018-4036

больше 7 лет назад

ELSA-2018-4036: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3626

около 8 лет назад

ELSA-2017-3626: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-2801

около 8 лет назад

ELSA-2017-2801: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-2795

около 8 лет назад

ELSA-2017-2795: kernel security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2017-02405

больше 10 лет назад

Уязвимость функции load_elf_binary ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2017:3165-1

почти 8 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0152-1

10 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-rm92-8pw8-34fm

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

CVSS3: 7.8
56%
Средний
больше 3 лет назад
ubuntu логотип
CVE-2017-1000253

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

CVSS3: 7.8
56%
Средний
около 8 лет назад
redhat логотип
CVE-2017-1000253

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

CVSS3: 7.8
56%
Средний
около 8 лет назад
nvd логотип
CVE-2017-1000253

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.

CVSS3: 7.8
56%
Средний
около 8 лет назад
debian логотип
CVE-2017-1000253

Linux distributions that have not patched their long-term kernels with ...

CVSS3: 7.8
56%
Средний
около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2725-1

Security update for the Linux Kernel

56%
Средний
около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2723-1

Security update for the Linux Kernel

56%
Средний
около 8 лет назад
oracle-oval логотип
ELSA-2018-4036

ELSA-2018-4036: kernel security update (IMPORTANT)

больше 7 лет назад
oracle-oval логотип
ELSA-2017-3626

ELSA-2017-3626: Unbreakable Enterprise kernel security update (IMPORTANT)

около 8 лет назад
oracle-oval логотип
ELSA-2017-2801

ELSA-2017-2801: kernel security update (IMPORTANT)

около 8 лет назад
oracle-oval логотип
ELSA-2017-2795

ELSA-2017-2795: kernel security update (IMPORTANT)

около 8 лет назад
fstec логотип
BDU:2017-02405

Уязвимость функции load_elf_binary ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
56%
Средний
больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2017:3165-1

Security update for the Linux Kernel

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2025:0152-1

Security update for the Linux Kernel

10 месяцев назад

Уязвимостей на страницу