arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.
References
Link | Resource |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c623b33b4e9599c6ac5076f7db7369eb9869aa04 | Issue Tracking Patch Vendor Advisory |
http://source.android.com/security/bulletin/2016-12-01.html | Third Party Advisory |
http://www.securityfocus.com/bid/94680 | Third Party Advisory VDB Entry |
https://github.com/torvalds/linux/commit/c623b33b4e9599c6ac5076f7db7369eb9869aa04 | Issue Tracking Patch Third Party Advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c623b33b4e9599c6ac5076f7db7369eb9869aa04 | Issue Tracking Patch Vendor Advisory |
http://source.android.com/security/bulletin/2016-12-01.html | Third Party Advisory |
http://www.securityfocus.com/bid/94680 | Third Party Advisory VDB Entry |
https://github.com/torvalds/linux/commit/c623b33b4e9599c6ac5076f7db7369eb9869aa04 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c623b33b4e9599c6ac5076f7db7369eb9869aa04 - Issue Tracking, Patch, Vendor Advisory | |
References | () http://source.android.com/security/bulletin/2016-12-01.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/94680 - Third Party Advisory, VDB Entry | |
References | () https://github.com/torvalds/linux/commit/c623b33b4e9599c6ac5076f7db7369eb9869aa04 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2016-12-08 21:59
Updated : 2024-11-21 02:39
NVD link : CVE-2015-8967
Mitre link : CVE-2015-8967
CVE.ORG link : CVE-2015-8967
JSON object : View
Products Affected
- android
linux
- linux_kernel
CWE
CWE-264
Permissions, Privileges, and Access Controls