The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Milo-D/CVE-2016-6187_LPE
- https://github.com/R0B1NL1N/linux-kernel-exploitation
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/chadjoan/cdj-kernel-config
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/khnhdz/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps
- https://github.com/purplewall1206/PET
- https://github.com/r0ysue/OSG-TranslationTeam
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/vnik5287/cve-2016-6187-poc
- https://github.com/whiteHat001/Kernel-Security
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation