Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6187

Опубликовано: 06 авг. 2016
Источник: debian
EPSS Низкий

Описание

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.6.4-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • Introduced by: https://git.kernel.org/linus/bb646cdb12e75d82258c2f2e7746d5952d3e321a (v4.5-rc1)

  • Fixed by: https://git.kernel.org/linus/30a46a4647fd1df9cf52e43bf467f0d9265096ca (v4.7-rc7)

  • https://www.openwall.com/lists/oss-security/2016/07/09/1

EPSS

Процентиль: 90%
0.06037
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

CVSS3: 7
redhat
больше 9 лет назад

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

CVSS3: 7.8
nvd
больше 9 лет назад

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

CVSS3: 7.8
github
больше 3 лет назад

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

EPSS

Процентиль: 90%
0.06037
Низкий