First published: Fri Feb 13 2015(Updated: )
It was reported [1] that stack address is not properly randomized on some 64 bit architectures due to an integer overflow. The stack entropy of the processes is reduced by four. The possible locations are significantly reduced from around one billion to two hundred millions. The problem seems to affect only to the x86_64 architecture. Proposed patch: <a href="https://lkml.org/lkml/2015/1/7/811">https://lkml.org/lkml/2015/1/7/811</a> [1]: <a href="http://hmarco.org/bugs/linux-ASLR-integer-overflow.html">http://hmarco.org/bugs/linux-ASLR-integer-overflow.html</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=3.18.9 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.