Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8967

Опубликовано: 08 дек. 2016
Источник: debian
EPSS Низкий

Описание

arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.0.2-1package

Примечания

  • Fixed by: https://git.kernel.org/linus/c623b33b4e9599c6ac5076f7db7369eb9869aa04 (v4.0-rc1)

  • Missing security mitigation, not a vulnerability per se

EPSS

Процентиль: 22%
0.00072
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 9 лет назад

arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.

CVSS3: 7.8
redhat
около 9 лет назад

arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.

CVSS3: 7.8
nvd
около 9 лет назад

arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.

CVSS3: 7.8
github
больше 3 лет назад

arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.

EPSS

Процентиль: 22%
0.00072
Низкий