arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.
References
Configurations
History
21 Nov 2024, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6829e274a623187c24f7cfc0e3d35f25d087fcc5 - Issue Tracking, Patch | |
References | () http://source.android.com/security/bulletin/2016-10-01.html - Vendor Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.3 - Release Notes | |
References | () http://www.securityfocus.com/bid/93318 - | |
References | () https://github.com/torvalds/linux/commit/6829e274a623187c24f7cfc0e3d35f25d087fcc5 - Issue Tracking, Patch | |
References | () https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=6e2c437a2d0a85d90d3db85a7471f99764f7bbf8 - Issue Tracking, Patch |
Information
Published : 2016-10-10 10:59
Updated : 2024-11-21 02:39
NVD link : CVE-2015-8950
Mitre link : CVE-2015-8950
CVE.ORG link : CVE-2015-8950
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor