CVE-2015-1593

Published: 16 March 2015

The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.

From the Ubuntu security team

An integer overflow was discovered in the stack randomization feature of the Linux kernel on 64 bit platforms. A local attacker could exploit this flaw to bypass the Address Space Layout Randomization (ASLR) protection mechanism.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc1)