7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
android.googlesource.com/kernel/common/+/1b627d4e5e61e89b840f77abb3ca6711ad6ffbeb
android.googlesource.com/kernel/common/+/211d59c0034ec9d88690c750ccd6da27f6952dc5
android.googlesource.com/kernel/common/+/44d057a37868a60bc2eb6e7d1dcea701f234d56a
android.googlesource.com/kernel/common/+/4c941665c7368a34b146929b31949555e680a4ee
android.googlesource.com/kernel/common/+/758f0dac9104b46016af98304656a0268ac3e105
android.googlesource.com/kernel/common/+/b9b9f908c8ae82b73b9d75181982028b6bc06c2b
android.googlesource.com/kernel/common/+/c22e479e335628ce8766cfbf06e2ba17e8f9a1bb
android.googlesource.com/kernel/common/+/c9e31d5a4747e9967ace6d05896c78516c4c0850
android.googlesource.com/kernel/common/+/e01834bfbafd25fd392bf10014451c4e5f34f829
android.googlesource.com/kernel/common/+/e068734f9e7344997a61022629b92d142a985ab3
android.googlesource.com/kernel/common/+/fdc6c1052bc7d89a5826904fbb4318677e8442ce
nvd.nist.gov/vuln/data-feeds
source.android.com/security/bulletin/2016-04-02.html
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C