Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6187

Опубликовано: 08 июл. 2016
Источник: redhat
CVSS3: 7
CVSS2: 6.9
EPSS Низкий

Описание

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

A vulnerability leading to a local privilege escalation was found in apparmor in the Linux kernel. When proc_pid_attr_write() was changed to use memdup_user apparmor's (interface violating) assumption that the setprocattr buffer was always a single page was violated.

Отчет

Red Hat Enterprise Linux is not affected by this flaw as CONFIG_SECURITY_APPARMOR is not enabled in any current shipping kernels.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise MRG 2realtime-kernelNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-131
https://bugzilla.redhat.com/show_bug.cgi?id=1354383kernel: apparmor: Potential privilege escalation via oops in apparmor_setprocattr()

EPSS

Процентиль: 90%
0.06037
Низкий

7 High

CVSS3

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

CVSS3: 7.8
nvd
больше 9 лет назад

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

CVSS3: 7.8
debian
больше 9 лет назад

The apparmor_setprocattr function in security/apparmor/lsm.c in the Li ...

CVSS3: 7.8
github
больше 3 лет назад

The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.

EPSS

Процентиль: 90%
0.06037
Низкий

7 High

CVSS3

6.9 Medium

CVSS2