Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-8660

EPSS 59.96% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-8660

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel‘fs/overlayfs/inode.c’权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。NFSv4 implementation是其中的一个分布式文件系统协议。 Linux kernel 4.3.2及之前版本的fs/overlayfs/inode.c文件中的‘ovl_setattr’函数存在安全漏洞,该漏洞源于程序试图合并不同的setattr操作。本地攻击者可借助特制的应用程序利用该漏洞绕过既定的访问限制,修改任意overlay文件的属性。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-8660

#POC DescriptionSource LinkShenlong Link
1这个代码包含了CVE-2015-8660漏洞的利用代码,还有注释,出现问题的源代码,打了补丁后的代码https://github.com/whu-enjoy/CVE-2015-8660POC Details
2Nonehttps://github.com/nhamle2/CVE-2015-8660POC Details
3Nonehttps://github.com/carradolly/CVE-2015-8660POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-8660

Please Login to view more intelligence information

Same Patch Batch · n/a · 2015-12-28 · 30 CVEs total

CVE-2015-8647多款Adobe产品释放后重用漏洞
CVE-2015-8569Linux kernel 本地信息泄露漏洞
CVE-2015-8543Linux kernel networking 拒绝服务漏洞
CVE-2015-8374Linux kernel‘btrfs/inode.c’信息泄露漏洞
CVE-2015-7990Linux kernel 竞争条件漏洞
CVE-2015-7885Linux kernel 本地信息泄露漏洞
CVE-2015-7884Linux kernel 本地信息泄露漏洞
CVE-2015-7509Linux kernel 输入验证错误漏洞
CVE-2013-7446Linux kernel 释放后重用漏洞
CVE-2015-6852EMC Secure Remote Services Virtual Edition 目录遍历漏洞
CVE-2015-6850EMC VPLEX GeoSynchrony 权限许可和访问控制漏洞
CVE-2015-8651多款Adobe产品数字错误漏洞
CVE-2015-8650多款Adobe产品释放后重用漏洞
CVE-2015-8649多款Adobe产品释放后重用漏洞
CVE-2015-8648多款Adobe产品释放后重用漏洞
CVE-2015-8459多款Adobe产品缓冲区溢出漏洞
CVE-2015-8646多款Adobe产品释放后重用漏洞
CVE-2015-8645多款Adobe产品缓冲区溢出漏洞
CVE-2015-8644多款Adobe产品安全漏洞
CVE-2015-8643多款Adobe产品释放后重用漏洞

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2015-8660

No comments yet


Leave a comment