Описание
The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
Ссылки
- Issue TrackingPatch
- Third Party Advisory
- Release Notes
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Issue Tracking
- Issue TrackingPatch
- Issue TrackingPatch
- Third Party Advisory
- Release Notes
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Issue Tracking
- Issue TrackingPatch
Уязвимые конфигурации
EPSS
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
Связанные уязвимости
The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
The apparmor_setprocattr function in security/apparmor/lsm.c in the Li ...
The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
EPSS
7.8 High
CVSS3
7.2 High
CVSS2