First published: Fri Feb 13 2015(Updated: )
It was reported [1] that stack address is not properly randomized on some 64 bit architectures due to an integer overflow. The stack entropy of the processes is reduced by four. The possible locations are significantly reduced from around one billion to two hundred millions. The problem seems to affect only to the x86_64 architecture. Proposed patch: <a href="https://lkml.org/lkml/2015/1/7/811">https://lkml.org/lkml/2015/1/7/811</a> [1]: <a href="http://hmarco.org/bugs/linux-ASLR-integer-overflow.html">http://hmarco.org/bugs/linux-ASLR-integer-overflow.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.18.9 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1593 has a medium severity rating due to the reduced entropy in stack address randomization.
To fix CVE-2015-1593, update your Linux kernel to version 5.10.223-1 or later, 6.1.123-1 or later, or 6.12.12-1 or later.
CVE-2015-1593 affects various Linux kernel versions prior to 3.18.9 on 64-bit architectures.
CVE-2015-1593 causes a decrease in stack address randomization, potentially leading to easier exploitation of stack-based vulnerabilities.
Yes, CVE-2015-1593 impacts memory safety by reducing the unpredictability of stack memory addresses.