CVE-2016-1583
high-risk
Published 2016-06-27
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
Do I need to act?
-
0.37% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
References (100)
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
and 80 more references
52
/ 100
high-risk
Severity
24/34 · High
Exploitability
8/34 · Low
Exposure
20/34 · Moderate