Описание
The sockets subsystem in Android 6.x before 2016-07-01 allows attackers to bypass intended system-call restrictions via a crafted application that makes an ioctl call, aka internal bug 28171804.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | SELinux policy not used |
| esm-apps/xenial | not-affected | SELinux policy not used |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [SELinux policy not used]] |
| precise | DNE | |
| trusty | not-affected | SELinux policy not used |
| trusty/esm | DNE | trusty was not-affected [SELinux policy not used] |
| upstream | not-affected | SELinux policy not used |
| vivid/stable-phone-overlay | not-affected | SELinux policy not used |
| vivid/ubuntu-core | DNE | |
| wily | not-affected | SELinux policy not used |
Показывать по
EPSS
7.5 High
CVSS2
8.4 High
CVSS3
Связанные уязвимости
The sockets subsystem in Android 6.x before 2016-07-01 allows attackers to bypass intended system-call restrictions via a crafted application that makes an ioctl call, aka internal bug 28171804.
The sockets subsystem in Android 6.x before 2016-07-01 allows attackers to bypass intended system-call restrictions via a crafted application that makes an ioctl call, aka internal bug 28171804.
Уязвимость операционной системы Android, позволяющая нарушителю обойти существующие ограничения системных вызовов
EPSS
7.5 High
CVSS2
8.4 High
CVSS3