7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
61.5%
An elevation of privilege vulnerability in the kernel networking subsystem
could enable a local malicious application to execute arbitrary code within
the context of the kernel. This issue is rated as Moderate because it first
requires compromising a privileged process and current compiler
optimizations restrict access to the vulnerable code. Product: Android.
Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | linux | <Β 4.4.0-62.83 | UNKNOWN |
ubuntu | 16.10 | noarch | linux | <Β 4.8.0-37.39 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | <Β 4.4.0-1003.12 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | <Β 4.8.0-39.42~16.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe-edge | <Β 4.8.0-39.42~16.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | <Β 4.4.0-62.83~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-raspi2 | <Β 4.4.0-1042.49 | UNKNOWN |
ubuntu | 16.10 | noarch | linux-raspi2 | <Β 4.8.0-1024.27 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-snapdragon | <Β 4.4.0-1046.50 | UNKNOWN |
ubuntu | 16.10 | noarch | linux-snapdragon | <Β 4.4.0-1046.50 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2016-8399
nvd.nist.gov/vuln/detail/CVE-2016-8399
security-tracker.debian.org/tracker/CVE-2016-8399
ubuntu.com/security/notices/USN-3189-1
ubuntu.com/security/notices/USN-3189-2
ubuntu.com/security/notices/USN-3190-1
ubuntu.com/security/notices/USN-3190-2
www.cve.org/CVERecord?id=CVE-2016-8399
7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
61.5%