High severity7.8NVD Advisory· Published Dec 8, 2016· Updated May 6, 2026
CVE-2015-8967
CVE-2015-8967
Description
arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdIssue TrackingPatchVendor Advisory
- github.com/torvalds/linux/commit/c623b33b4e9599c6ac5076f7db7369eb9869aa04nvdIssue TrackingPatchThird Party Advisory
- source.android.com/security/bulletin/2016-12-01.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/94680nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.