Back to bug 1404284

Who When What Removed Added
Andrej Nemec 2016-12-13 14:28:15 UTC Blocks 1404286
Adam Mariš 2016-12-13 14:40:48 UTC Whiteboard impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Slawomir Czarko 2016-12-15 09:03:21 UTC CC slawomir
Vladis Dronov 2016-12-21 10:23:14 UTC CC vdronov
Vladis Dronov 2016-12-21 10:29:21 UTC Doc Text The flaw in the code in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.
Doc Type If docs needed, set a value Bug Fix
Whiteboard impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Vladis Dronov 2016-12-21 10:31:11 UTC Status NEW CLOSED
Resolution --- NOTABUG
Last Closed 2016-12-21 05:31:11 UTC
Vladis Dronov 2016-12-21 10:42:27 UTC Summary CVE-2015-8967 kernel: Strict page permission bypass CVE-2015-8967 kernel: arm64: Strict page permission bypass
Eric Christensen 2016-12-21 19:02:41 UTC Doc Text The flaw in the code in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access. A flaw in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the strict
Eric Christensen 2016-12-21 19:03:38 UTC Doc Text A flaw in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the strict A flaw in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the 'strict page permissions' protection mechanism and modify the system-call table and, consequently, gain privileges by leveraging write access.
Product Security DevOps Team 2019-09-29 14:02:45 UTC Whiteboard impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected

Back to bug 1404284