Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-1593
HistoryMar 16, 2015 - 12:00 a.m.

CVE-2015-1593

2015-03-1600:00:00
ubuntu.com
ubuntu.com
21

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.008 Low

EPSS

Percentile

81.5%

The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit
platforms uses incorrect data types for the results of bitwise left-shift
operations, which makes it easier for attackers to bypass the ASLR
protection mechanism by predicting the address of the top of the stack,
related to the randomize_stack_top function in fs/binfmt_elf.c and the
stack_maxrandom_size function in arch/x86/mm/mmap.c.

Bugs

Notes

Author Note
jdstrand android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchlinux<Β 3.2.0-80.116UNKNOWN
ubuntu14.04noarchlinux<Β 3.13.0-49.81UNKNOWN
ubuntu14.10noarchlinux<Β 3.16.0-34.45UNKNOWN
ubuntu12.04noarchlinux-armadaxp<Β 3.2.0-1648.67UNKNOWN
ubuntu12.04noarchlinux-lts-trusty<Β 3.13.0-49.81~precise1UNKNOWN
ubuntu14.04noarchlinux-lts-utopic<Β 3.16.0-34.45~14.04.1UNKNOWN
ubuntu12.04noarchlinux-ti-omap4<Β 3.2.0-1462.82UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.008 Low

EPSS

Percentile

81.5%