arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.
References
Link | Resource |
---|---|
http://source.android.com/security/bulletin/2016-12-01.html | Third Party Advisory |
https://github.com/torvalds/linux/commit/c623b33b4e9599c6ac5076f7db7369eb9869aa04 | Issue Tracking Patch Third Party Advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c623b33b4e9599c6ac5076f7db7369eb9869aa04 | Issue Tracking Patch Vendor Advisory |
http://www.securityfocus.com/bid/94680 | Third Party Advisory VDB Entry |
Information
Published : 2016-12-08 13:59
Updated : 2023-01-19 08:07
NVD link : CVE-2015-8967
Mitre link : CVE-2015-8967
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
- android
linux
- linux_kernel