CVE-2015-8967 PUBLISHED

arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.

EPSS 0.07% · 21.9th percentile

Risk Scores

EPSS Score
0.07%
21.9th percentile

Affected Products

VendorProductVersions
Ubuntu:24.04:LTSlinux-lowlatency-hwe-6.116.11.0-1014.15~24.04.1, 6.11.0-1013.14~24.04.1, 6.11.0-1012.13~24.04.1
Ubuntu:20.04:LTSlinux-raspi25.3.0-1017.19, 5.3.0-1014.16, 5.3.0-1007.8
Ubuntu:22.04:LTSlinux-realtime5.15.0-1032.35, 0
Ubuntu:18.04:LTSlinux-hwe-edge5.0.0-17.18~18.04.1, 5.0.0-15.16~18.04.1, 0
Ubuntu:18.04:LTSlinux-gcp4.15.0-1018.19, 4.15.0-1017.18, 4.15.0-1015.15
Ubuntu:18.04:LTSlinux-oem4.15.0-1057.66, 4.15.0-1103.114, 4.15.0-1102.113
Ubuntu:24.04:LTSlinux-riscv6.8.0-49.49.1, 6.8.0-48.48.1, 6.8.0-47.47.1
Ubuntu:24.04:LTSlinux-gcp-6.116.11.0-1017.17~24.04.1, 6.11.0-1016.16~24.04.1, 6.11.0-1015.15~24.04.1
Ubuntu:24.04:LTSlinux-hwe-6.116.11.0-25.25~24.04.1, 0, 6.11.0-17.17~24.04.2
Ubuntu:18.04:LTSlinux-hwe5.3.0-51.44~18.04.2, 5.3.0-46.38~18.04.1, 5.3.0-64.58~18.04.1
Ubuntu:20.04:LTSlinux-gkeop5.4.0-1033.34, 5.4.0-1031.32, 5.4.0-1029.30
Ubuntu:20.04:LTSlinux-gke5.4.0-1037.39, 0, 5.4.0-1033.35
Ubuntu:22.04:LTSlinux-intel-iot-realtime0, 5.15.0-1073.75
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1098.104+cvm1.1, 5.4.0-1095.101+cvm1.1, 5.4.0-1092.97+cvm1.1
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:22.04:LTSlinux-riscv5.15.0-1026.30, 5.15.0-1023.27, 5.15.0-1022.26
Ubuntu:Pro:20.04:LTSlinux-azure-fde-5.155.15.0-1103.112~20.04.1.1, 5.15.0-1019.24~20.04.1.1, 5.15.0-1020.25~20.04.1.1
Ubuntu:20.04:LTSlinux-riscv0, 5.4.0-40.45, 5.4.0-39.44
Ubuntu:14.04:LTSlinux3.13.0-85.129, 3.13.0-46.75, 3.13.0-45.74
Ubuntu:24.04:LTSlinux-azure-6.110, 6.11.0-1008.8~24.04.1, 6.11.0-1012.12~24.04.1

…and 2 more

Timeline

References

Open in Interactive Console →