Vulnerability Description
arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | <= 7.0 | |
| Linux | Linux Kernel | <= 3.18.54 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c623b3Issue TrackingPatchVendor Advisory
- http://source.android.com/security/bulletin/2016-12-01.htmlThird Party Advisory
- http://www.securityfocus.com/bid/94680Third Party AdvisoryVDB Entry
- https://github.com/torvalds/linux/commit/c623b33b4e9599c6ac5076f7db7369eb9869aa0Issue TrackingPatchThird Party Advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c623b3Issue TrackingPatchVendor Advisory
- http://source.android.com/security/bulletin/2016-12-01.htmlThird Party Advisory
- http://www.securityfocus.com/bid/94680Third Party AdvisoryVDB Entry
- https://github.com/torvalds/linux/commit/c623b33b4e9599c6ac5076f7db7369eb9869aa0Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2015-8967?
CVE-2015-8967 is a vulnerability with a CVSS score of 7.8 (HIGH). arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privilege...
How severe is CVE-2015-8967?
CVE-2015-8967 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-8967?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android, Linux Linux Kernel.