CVE-2016-8399

An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2017-0817.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2017-0817.html - Third Party Advisory
References () http://www.securityfocus.com/bid/94708 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94708 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:0869 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:0869 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2930 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2930 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2931 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2931 - Third Party Advisory
References () https://source.android.com/security/bulletin/2016-12-01.html - Vendor Advisory () https://source.android.com/security/bulletin/2016-12-01.html - Vendor Advisory
References () https://support.f5.com/csp/article/K23030550?utm_source=f5support&amp%3Butm_medium=RSS - Third Party Advisory () https://support.f5.com/csp/article/K23030550?utm_source=f5support&amp%3Butm_medium=RSS - Third Party Advisory

02 Apr 2024, 18:02

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () http://rhn.redhat.com/errata/RHSA-2017-0817.html - () http://rhn.redhat.com/errata/RHSA-2017-0817.html - Third Party Advisory
References () http://www.securityfocus.com/bid/94708 - () http://www.securityfocus.com/bid/94708 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:0869 - () https://access.redhat.com/errata/RHSA-2017:0869 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2930 - () https://access.redhat.com/errata/RHSA-2017:2930 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2931 - () https://access.redhat.com/errata/RHSA-2017:2931 - Third Party Advisory
References () https://support.f5.com/csp/article/K23030550?utm_source=f5support&amp%3Butm_medium=RSS - () https://support.f5.com/csp/article/K23030550?utm_source=f5support&amp%3Butm_medium=RSS - Third Party Advisory

07 Nov 2023, 02:36

Type Values Removed Values Added
References
  • {'url': 'https://support.f5.com/csp/article/K23030550?utm_source=f5support&utm_medium=RSS', 'name': 'https://support.f5.com/csp/article/K23030550?utm_source=f5support&utm_medium=RSS', 'tags': [], 'refsource': 'CONFIRM'}
  • () https://support.f5.com/csp/article/K23030550?utm_source=f5support&amp%3Butm_medium=RSS -

Information

Published : 2017-01-12 15:59

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8399

Mitre link : CVE-2016-8399

CVE.ORG link : CVE-2016-8399


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-284

Improper Access Control