An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-0817.html | Third Party Advisory |
http://www.securityfocus.com/bid/94708 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:0869 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2017:2930 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2017:2931 | Third Party Advisory |
https://source.android.com/security/bulletin/2016-12-01.html | Vendor Advisory |
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medium=RSS | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-01-12 15:59
Updated : 2024-04-02 18:02
NVD link : CVE-2016-8399
Mitre link : CVE-2016-8399
CVE.ORG link : CVE-2016-8399
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-284
Improper Access Control