An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/2016-12-01.html | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2931 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/94708 | vdb entry third party advisory |
http://rhn.redhat.com/errata/RHSA-2017-0817.html | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2017:0869 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2930 | third party advisory vendor advisory |
https://support.f5.com/csp/article/K23030550?utm_source=f5support&%3Butm_medium=RSS | third party advisory |