Back to bug 1404284
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Andrej Nemec | 2016-12-13 14:28:15 UTC | Blocks | 1404286 | |
| Adam Mariš | 2016-12-13 14:40:48 UTC | Whiteboard | impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected | impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected |
| Slawomir Czarko | 2016-12-15 09:03:21 UTC | CC | slawomir | |
| Vladis Dronov | 2016-12-21 10:23:14 UTC | CC | vdronov | |
| Vladis Dronov | 2016-12-21 10:29:21 UTC | Doc Text | The flaw in the code in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access. | |
| Doc Type | If docs needed, set a value | Bug Fix | ||
| Whiteboard | impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected | impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected | ||
| Vladis Dronov | 2016-12-21 10:31:11 UTC | Status | NEW | CLOSED |
| Resolution | --- | NOTABUG | ||
| Last Closed | 2016-12-21 05:31:11 UTC | |||
| Vladis Dronov | 2016-12-21 10:42:27 UTC | Summary | CVE-2015-8967 kernel: Strict page permission bypass | CVE-2015-8967 kernel: arm64: Strict page permission bypass |
| Eric Christensen | 2016-12-21 19:02:41 UTC | Doc Text | The flaw in the code in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access. | A flaw in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the strict |
| Eric Christensen | 2016-12-21 19:03:38 UTC | Doc Text | A flaw in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the strict | A flaw in 'arch/arm64/kernel/sys.c' in the Linux kernel allows local users to bypass the 'strict page permissions' protection mechanism and modify the system-call table and, consequently, gain privileges by leveraging write access. |
| Product Security DevOps Team | 2019-09-29 14:02:45 UTC | Whiteboard | impact=important,public=20161208,reported=20161209,source=suse,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-471,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected |
Back to bug 1404284