First published: Fri May 06 2016(Updated: )
A security flaw was found in the Linux kernel that there is a way to arbitrary change zero page memory. Zero page is a page which kernel maps into virtual address space on read page fault if the page was not allocated before. Kernel has one zero page which used everywhere. Programs that map 0 page are affected and code execution can be gained. Upon running the exploit the system may become unusable as the linker memory pages gets tainted. Furthermore, if the right code is put in the 0 page, code execution is possible.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Linux Kernel | <3.2.71 | |
Linux Kernel | >=3.4<3.4.111 | |
Linux Kernel | >=3.10<3.10.86 | |
Linux Kernel | >=3.12<3.12.47 | |
Linux Kernel | >=3.14<3.14.50 | |
Linux Kernel | >=3.16<3.16.35 | |
Linux Kernel | >=3.18<3.18.52 | |
Linux Kernel | >=4.1.0<4.1.4 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3288 is a vulnerability in the Linux kernel that allows local users to gain privileges or cause a denial of service.
CVE-2015-3288 has a severity rating of critical.
CVE-2015-3288 affects the Linux kernel before version 4.1.4 and can be exploited by local users to gain privileges or cause a denial of service by triggering writing to page zero.
To fix CVE-2015-3288, upgrade your Linux kernel to version 4.2 or later.
You can find more information about CVE-2015-3288 at the following references: [1] [2] [3]