CVE-2015-1593

Impact:
Low
Public Date:
2015-02-13
CWE:
CWE-190
Bugzilla:
1192519: CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow
An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four.

Find out more about CVE-2015-1593 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does affect the Linux kernel versions as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates in the respective releases may address this issue.

This issue does affect the Linux kernel versions as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

CVSS v2 metrics

Base Score 1.9
Base Metrics AV:L/AC:M/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (kernel) RHSA-2015:1221 2015-07-14
Red Hat Enterprise Linux 7 (kernel) RHSA-2015:1137 2015-06-23
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) RHSA-2015:1139 2015-06-23
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2015:1138 2015-06-23

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 kernel Will not fix
Red Hat Enterprise Linux 7 kernel-alt Will not fix
Red Hat Enterprise Linux 5 kernel Will not fix
Last Modified