Описание
Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-apps/xenial | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was ignored [end of life, was needs-triage] |
| lucid | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| quantal | DNE | |
| saucy | DNE | |
| trusty | ignored | end of standard support, was needs-triage |
| trusty/esm | ignored | end of life, was needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-apps/xenial | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was ignored [end of life, was needs-triage] |
| lucid | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | ignored | end of standard support, was needs-triage |
| trusty/esm | ignored | end of life, was needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was ignored [end of life, was needs-triage] |
| lucid | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | ignored | end of standard support, was needs-triage |
| trusty/esm | ignored | end of life, was needs-triage |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [abandoned]] |
| lucid | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE | trusty was ignored [abandoned] |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-apps/xenial | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was ignored [end of life, was needs-triage] |
| lucid | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | ignored | end of standard support, was needs-triage |
| trusty/esm | ignored | end of life, was needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was ignored [end of life, was needs-triage] |
| lucid | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | ignored | end of standard support, was needs-triage |
| trusty/esm | ignored | end of life, was needs-triage |
| upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
7.2 High
CVSS2
Связанные уязвимости
Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.
Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.
EPSS
7.2 High
CVSS2