CVE-2015-8950

arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:39

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6829e274a623187c24f7cfc0e3d35f25d087fcc5 - Issue Tracking, Patch () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6829e274a623187c24f7cfc0e3d35f25d087fcc5 - Issue Tracking, Patch
References () http://source.android.com/security/bulletin/2016-10-01.html - Vendor Advisory () http://source.android.com/security/bulletin/2016-10-01.html - Vendor Advisory
References () http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.3 - Release Notes () http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.3 - Release Notes
References () http://www.securityfocus.com/bid/93318 - () http://www.securityfocus.com/bid/93318 -
References () https://github.com/torvalds/linux/commit/6829e274a623187c24f7cfc0e3d35f25d087fcc5 - Issue Tracking, Patch () https://github.com/torvalds/linux/commit/6829e274a623187c24f7cfc0e3d35f25d087fcc5 - Issue Tracking, Patch
References () https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=6e2c437a2d0a85d90d3db85a7471f99764f7bbf8 - Issue Tracking, Patch () https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=6e2c437a2d0a85d90d3db85a7471f99764f7bbf8 - Issue Tracking, Patch

Information

Published : 2016-10-10 10:59

Updated : 2024-11-21 02:39


NVD link : CVE-2015-8950

Mitre link : CVE-2015-8950

CVE.ORG link : CVE-2015-8950


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor